Norton - Blogs - Norton Protection Bloghttps://community.norton.com/de/item-feeds
Norton - Blogs - Norton Protection BlogdeThe ultimate guide to online datinghttps://community.norton.com/de/node/1424281
<p>Online dating is as normal to life as is online shopping. Believe it or not, online dating has been around for 20 years, and as a result, cybercriminals are finding big money in people looking for love. However, these aren’t issues that should deter you from fishing in the sea of online dating.</p>
<p>In this guide, we will take you step-by-step through the entire online dating process. From finding the best dating site, protecting your digital privacy, all the way up to that first date, we’ve got you covered.</p>
<p><img class="norton-image-right" src="/en/system/files/u2038063/Vday%20AI.jpg"><strong><u>Step 1</u></strong></p>
<p><strong>Choosing the right site</strong><br>
The cyber-sea of love can be overwhelming to navigate. It is estimated that there are approximately 5,000 online dating sites worldwide.</p>
<p>The first thing you’ll want to check is if the website is a reputable site. We suggest that you stick to well-known websites and do some research. Conduct Internet searches in order to find out how many members are subscribed, read reviews that may include both good and bad experiences from the site.</p>
<p>Visit the website itself and investigate before signing up. Read the privacy policy. Look for an “about us” section. Does the site provide the name of a real person, or at least a phone number to contact if you have questions?<br><br><strong>Paid vs. free? </strong><br>
This really depends on what you are looking for. Paid sites tend to have members that are committed to actually meeting people in real life, because it is a financial investment. Membership to these sites isn’t cheap, so if someone is paying, they are usually more serious about actually finding a relationship.</p>
<p>Free sites tend to have more members, which equals more choices, but it also means there’s a higher chance of interacting with a scammer on a these sites.</p>
<p><strong>The personal factor</strong><br>
Keep in mind; most of these sites will store more personal information about you than other websites do. When you fill out a profile on one of these sites, it can be extremely detailed. These sites will often ask you to list the city you live in, your date of birth, marital status, gender, and even more detailed information, such as if you own pets or have children. It may seem rather invasive, but it helps the site match you with people in your area and help you narrow down criteria in member searches.</p>
<p>Additionally, a lot of these sites will have what are called “personality quizzes” The purpose of these quizzes are to help match you with other like-minded individuals. However, those answers from those tests can be very personal and you want to be sure that your private information is being protected properly.</p>
<p><strong>How to protect your privacy on online dating sites:</strong></p>
<ul>
<li>Check to see if the website deletes your data after you close your account. Some sites will allow you to either delete or disable your account. Since users sometimes return to online dating, the site may retain your information.</li>
<li>Check the privacy settings on your profile.<br>
Some dating sites make profiles public by default, which means that they can be indexed by search engines.</li>
<li>Look at the privacy policy.<br>
It should be clear about how it shares your personal information with other members. It should also be clear about who else gets to access your data, such as third parties.</li>
<li>Does it reveal your photo only to members or also for online advertising? If so, is there an option to opt-out?</li>
</ul>
<p><strong><u>Step 2</u></strong></p>
<p><strong>Creating Your Profile: </strong><br>
Of course, you want to create an enticing and attractive picture of yourself for others to see, but keep a tight grip on what personal information you put out there for everyone to see. For example, it’s ok to say what you do for work, but not to say what company it is.</p>
<p>Create a username that you have not used on any other accounts. Make sure you do not use any aspect of your real name, or any other personally identifiable such as birthdates- even birth years. Your username can be searched, and anything tied to that username can come up easily.</p>
<p><strong>Choosing Photos:</strong><br>
A picture really is worth a thousand words. The photos you post on your profile can actually contain a lot of information about you in the background if you’re not careful. Last year, a user was goofing around in his sister’s room, and took a photo of himself. Within 24 hours, members of that website managed to track down the sister’s identity, social media accounts and more all based on what was in the background. A user can do a reverse image search and easily locate other websites where that photo is posted. In this case- brand new selfies are a-ok!</p>
<p><strong>Profile Do’s and Don’ts:</strong></p>
<ul>
<li>Create a username that you have not used on any other online accounts that you are associated with. Your username can be searched, and anything tied to that username can display in Internet search results.</li>
<li>The same applies for the photos you post on your profile. A user can do a reverse image search and easily locate other websites where that photo is posted. In this case, you’ll want to create unique photos that are posted on that site only. Which means it’s ok to go selfie crazy!</li>
<li>Set up a free email account to use with your dating account that has a unique name. Make sure that the email account has no personal information about you in the address.<br>
</li>
</ul>
<p><strong><u>Step 3</u></strong></p>
<p><strong>Safe Communicating:</strong><br>
While it may not seem harmful to give out your phone number or personal email address- don’t just yet. You may have been chatting online awhile with your new crush, however, they’re still a stranger until you meet in real life. People can put on appearances online that aren’t actually true to their real life. Use caution about giving away anything that can link you to your identity online. It’s even ok to not give someone your last name until the date is set up.</p>
<ul>
<li>Initially, keep communication to potential sweethearts limited to the dating site itself. A lot of these sites have moderators, and allow you to report anything that seems offensive and even threatening.</li>
<li>If you and your new friend decide to move the conversation to email, use the dedicated email account that you created for the online account to protect your anonymity.</li>
<li>When the time comes for a phone call, be cautious and set up a free Google Voice account, which will generate a separate phone number and forward it to your mobile. In the event that things fizzle out, the other person won’t have your real phone number.</li>
</ul>
<p><strong>Make sure you don’t catch a "catfish"</strong><br>
Catfishing is a different kind of scam in and of itself. Catfishing is when a user assumes the identity of someone else. This tactic is used by online predators to try to trick people into an online romantic relationship. Catfishers will always make up excuses as to why they can’t meet you, talk on the phone or meet up on webcam. If the user’s profile seems too good to be true, it probably is. Do a reverse online image search of their photos, and if they appear in other places, under other names, you may have caught yourself a catfish.</p>
<p><strong>How to spot online dating scams:</strong><br>
Online dating, while extremely beneficial is not infallible to cybercriminals. In addition to personal safety from online predators such as stalkers and Catfishers, there are also a slew of online scams that are perpetuated through these sites.</p>
<ul>
<li>An individual may contact you with a sob story, about being stranded in a foreign country, or a sudden family emergency. If they ask you for money, you should report them to the service you are using and then block them.</li>
<li>To help verify the identity of the person that you’re talking to, ask for a recent photo. If they protest or makes excuses as to why they can’t provide a photo, it is best to err on the side of caution.</li>
<li>If you’ve been chatting up a potential sweetheart for a while, and they continually put off meeting in real life, this could be a red flag.</li>
<li>Don’t visit links sent to you by people you haven’t talked to for very long. Scammers will pose as a member and try to get their target to click on links, usually leading to porn or webcam sites, and sometimes can even lead to malicious sites that download malware onto your computer.</li>
<li>If someone requests a webcam chat, be especially careful about your behavior. The criminal can record the webcam session and they can use it to blackmail you. If the conversation you’re having starts to take an uncomfortable turn, it’s okay to disconnect the chat.</li>
<li>Scammers create fake profiles that are run by programs called bots. Their objective is to get you to click on a link that will lead to either porn, malware or scam you out of credit card information. It’s actually quite easy to spot a bot, as they have a set of predetermined “canned” responses. If you notice that the conversation you’re having seems a bit off, or the person isn’t answering your questions directly, chances are it’s a bot.</li>
</ul>
<p><strong><u>Step 4</u></strong></p>
<p><strong>Meeting in real life</strong><br>
So, you’ve decided to meet up. While everything may seem to be going along swimmingly with your new crush, it’s still important to continue to exercise caution.</p>
<ul>
<li>Be sure that your first meeting is in a public place where there are other people around that may assist if things start to go south. Plus, your date still won’t have your home address.</li>
<li>Use the buddy system. Tell a close friend about the date, where you are going, how long you expect to be there, who the person is, and their phone number. This way, you have backup waiting in the wings, whether it’s to get out of an uncomfortable situation, or the date is just not going well, your friend can help bail you out.</li>
<li>Recently, some bars have a sign posted in the ladies room targeting online daters, stating to order a “special” drink if they’re having a bad date. The bar staff will come and assist you if you end up in an uncomfortable or unsafe situation.</li>
<li>If you’re not ready for one on one meeting, some sites organize dating events. These are relatively new, and a super safe way to meet new people in real life, as it is in a group. There are so many great and engaging activities; speed dating, pub quizzes and cookery classes are some of the few offerings.</li>
</ul>
Tue, 14 Feb 2017 07:46:41 +0000https://community.norton.com/de/node/1424281Why clean computing mattershttps://community.norton.com/de/node/1424291
<p>February 13th is National Clean out Your Computer day, and there’s good reason behind it. When you “clean” your computer, you don’t just dust off the keyboard and wipe fingerprints from the screen. You also pay attention to the state of the hard drive, updating software and removing old programs.</p>
<p><img class="norton-image-left" src="/en/system/files/u2038063/CCAM_1.jpg">​<strong>Why is cleaning up your computer important?</strong><br>
Clean software helps protect your data. Internet security software and regular program updates help ensure that viruses, malware, and remote “hackers” stay out of your system. When you maintain your files by backing them up, deleting unused programs, and performing maintenance tasks like defragmenting the hard drive, you help ensure your computer can save your files without accidentally corrupting them.</p>
<p><strong>How to clean your computer’s software</strong><br>
Once your computer’s physical parts are clean, it’s time to attend to the programs that create and store your important information. Here’s how to keep your computer’s “mind” as clean as its “body:”</p>
<ul>
<li>
<a href="https://community.norton.com/en/blogs/norton-protection-blog/ransomware-and-importance-backing"><strong>Back it up</strong></a><br>
Backing up your data regularly is a must. A laptop or tablet can be replaced, but the information inside it might be irreplaceable. Generally speaking, there are two options for backing up data: you can make a copy in a physical location, such as on an external hard drive or thumb drive, or you can make a copy that is stored on the “cloud,” or online, in a secure location. Whichever you choose, commit to backing up your computer at least once per week, or more often if you are working on a critical document like a business contract or a collection of precious family photos.</li>
<li>
<a href="http://us.norton.com/norton-security-with-backup" rel="nofollow"><strong>Protect against malware</strong></a><br>
Internet security software helps ensure that sneaky viruses and malware don’t get in and wreak havoc on your information—or worse, steal your identity. </li>
<li>
<a href="https://community.norton.com/en/blogs/norton-protection-blog/importance-general-software-updates-and-patches"><strong>Update your software and clean out old programs</strong></a> <br>
Outdated software is particularly vulnerable to malware, because most updates are created in order to keep software safe. Make sure your software is updated. While you do updates, check to make sure you’re actually using the programs on your system, and delete any you no longer use. This helps ensure that your computer doesn’t get bogged down with unnecessary data, and it limits the number of programs that malware might “hijack” in order to gain access to the system.</li>
</ul>
<p><strong>Tidy up your digital life</strong><br>
It’s time to delete those digital dust bunnies – that includes programs you don’t use and unimportant files littering your desktop. Here are a few quick tips to get started:</p>
<ul>
<li>
<strong>Cleanup your PC workspace</strong><br>
Some programs automatically create a short-cut that will be displayed as an icon on your desktop. Deleting short-cuts that you don’t use will not delete the program, but it will keep your desktop clean and organized. </li>
<li>
<strong>Get organized</strong> <br>
Create categories for your files (work, financial statements, family photos, kids’ homework, etc.), then create and label folders to bucket your files into. Delete unimportant items that don’t belong in either folder. When all is squared away – create a backup to save your files in a secure location other than your device hard drive.</li>
<li>
<strong>Update your passwords</strong> <br>
Regularly updating your passwords across all accounts and devices is a good digital security habit to adopt even when you’re not spring cleaning. Passwords are the keys to accessing your digital life and more important data, like financial information. Make sure to use a complex and unique password for each account. Using a free password manager tool like <a href="https://identitysafe.norton.com/" rel="nofollow">Norton Identity Safe</a> can make logging into your favorite sites easier and more secure. Plus, always opt-in to <a href="https://community.norton.com/en/blogs/norton-protection-blog/importance-two-factor-authentication">two factor authentication</a> when the services you use offer this in addition to password protection. </li>
</ul>
<p><strong>Don’t forget about your digital footprint</strong><br>
Your “digital footprint” includes all traces of your online activity, from commenting on news pieces or social media to making online purchases. Here’s how you can check on yours:</p>
<ul>
<li>
<strong>Enter your name into several search engines</strong><br>
Use multiple search engines to perform a search for your first and last name. If you’ve recently changed your name, look up both your prior name and your current one. Try the common misspellings as well. Review the first two pages of results. Are they positive? Do they show you in a professional and respectable light? If anything comes up that you don’t like, ask the site administrator to take it down.</li>
<li>
<strong>Double-check your privacy settings, but don’t trust them </strong><br>
Privacy settings on social media allow you to control who sees your posts on your social media streams. Spend some time getting to know these settings so you can use them fully – for example, Facebook allows you not only to limit posts merely to “friends,” but also to make customized lists of people who can see certain posts. However, don’t assume that privacy settings will protect you anywhere but on the social media site that uses them. For example, some Facebook users have reported finding their “friends-locked” photographs as public images on Google Image Search.</li>
</ul>
<p><strong>Cleaning house: securing your kids’ data</strong><br>
While your kids are minding their chores to help spring clean the house offline, keep their digital presence not only tidy but also secure. Educate yourself and your <a href="https://community.norton.com/en/blogs/norton-protection-blog/parents-best-practices-social-media-security">family about social networking</a> – be responsible about what you share and how to use privacy settings and restrictions. Information such as real names, a child’s age, their school’s name and the city that they live in should not be shared publicly to avoid risks like identity theft or <a href="https://community.norton.com/blogs/norton-protection-blog/how-protect-yourself-cyberstalkers">cyberstalking</a>. With the free <a href="https://onlinefamily.norton.com/familysafety/loginStart.fs" rel="nofollow">Norton Family</a> tool, parents can monitor kids’ social network use, protect sensitive personal information, and much more. Norton Family social network monitoring provides insights into kids' social media use, including how frequently they log in to Facebook from their PC, and the name and age they use on their profile.</p>
<p><strong>Out with the old: wipe away your digital data</strong><br>
Donating and recycling old devices is a great way to de-clutter – just be sure you are not recycling your data in the process. If your data is recovered on an old device it can be used to commit identity theft or fraud. Make a secure backup of your irreplaceable photos and files with <a href="http://us.norton.com/norton-security-with-backup" rel="nofollow">Norton Security with Backup</a>. Then delete and wipe devices of all data and reset to factory settings. Lastly don’t forget to remove any SIM or memory cards.</p>
<p><strong>Save</strong><strong>Save</strong></p>
<p><strong>Save</strong><strong>Save</strong></p>
Mon, 13 Feb 2017 15:32:28 +0000https://community.norton.com/de/node/1424291Love, lies and online datinghttps://community.norton.com/de/node/1427131
<p><img src="/en/system/files/u7098741/FB%20880x480%20160615_2543_AU06z100_150dpi_0.jpg"></p>
<p>It’s the age of modern romance. The approach of finding a partner has changed over a period of time. Busy lives and innovative technology have given rise to apps and websites that has increased the probability of finding a suitable companion. As in finding love the traditional way, online dating too also has its pros and cons.</p>
<p>A recent survey by Norton among men and women in Australia and New Zealand revealed that almost a quarter of the people who have tried online dating and no longer have a profile have found their partner online. The survey* conducted among New Zealanders and Australians revealed the results of the positives and pitfalls of online dating.</p>
<p><strong>True or false?</strong></p>
<p>A little white lie never hurt anyone, but it did change the profiles of 43% of people who’ve tried online dating in New Zealand and 51% in Australia. In their attempt to put their best foot forward, daters admit to exaggeration or embellishment on their dating profiles. 27% of daters in New Zealand and 33% in Australia are likely to lie about their income. Even physical attributes like their weight was misrepresented.</p>
<p><strong>The dating experience</strong></p>
<p><strong>She said </strong></p>
<p>A bad experience in dating is very dismaying. Nearly 70% of daters in New Zealand have had some kind of a negative experience while dating online. 43 % of the women are most likely to complain of receiving unpleasant or creepy emails. Another 33% of them ended up meeting people with highly misrepresentative profiles. An unfortunate 30% of them met people pretending to be single when they were not and 28% of them received unwanted, sexually explicit emails or texts.</p>
<p>Nearly 70% of Australian women had also had bad experiences. Most commonly, 34% Australian women also complained of receiving unpleasant or creepy emails, 30% of encountering people with misrepresented profiles and 27% of meeting people claiming to be single when, in fact, they were in a relationship already.</p>
<p>A significant minority of men readily admit to behaving badly. 15% of male online daters in Australia and 12% in New Zealand admit that they have used online dating sites to have an affair behind their partner’s back. Around one quarter of male online daters in both Australia and New Zealand say they have sent sexually explicit/nude images of themselves of stranger on online dating sites.</p>
<p><strong>He said</strong></p>
<p>However, male online daters had also encountered problems. 23 % men in Australia and 24% in New Zealand said they had encountered people on dating sites with highly misrepresentative profiles.</p>
<p>In New Zealand, men were more likely to complain of meeting people who asked them for money (25%). This experience was less commonly reported by Australian men (16%) but was still encountered by a significant number.</p>
<h4>What are the risks of online dating?</h4>
<p>Nearly half of those people who have negative experiences choose to ignore them but some people are more seriously affected. Over one third of people who have a negative experience stop using the dating site/app concerned and in a small minority of cases (6% in Australia and 3% in New Zealand) the incident is serious enough for people to report it to the police.</p>
<p>Almost 60% of all Australians and New Zealanders feel the need for website owners to do more to protect users.</p>
<p>This number indicates that as with regular dating, online dating has its risks too. When you post something online, it’s out there for everyone to see. While there are many genuinely nice men and women out there looking for a soul mate, there are some nefarious characters too. It’s hard to tell who is after what.</p>
<p>As with anything in life, your first line of defence is your instinct. Be watchful and cautious before you disclose too much of information online. You can run the risk of becoming a victim of <a href="https://community.norton.com/blogs/norton-protection-blog/how-protect-yourself-cyberstalkers">stalking</a>, harassment, catfishing, identity theft, webcam blackmail and even <a href="https://community.norton.com/blogs/norton-protection-blog/how-protect-yourself-phishing-scams">phishing scams</a>. In order to help mitigate these risks, be very careful with what information you provide on your profile. Make sure your computers, mobile phones and tablets have a reliable security suite like<a href="https://au.norton.com/products" rel="nofollow"> Norton Security Premium</a>. Make sure the website you visit is legitimate. Sneaky apps masquerade as the real deal and dig into your devices for information. With <a href="https://au.norton.com/norton-mobile-security" rel="nofollow">Norton Mobile Security</a>, you can use App Advisor for Android to help verify the legitimacy of an app.</p>
<p><strong>Profile do’s and don’ts:</strong></p>
<ul>
<li>Create a username that you have not used on any other accounts. Your username can be searched, and anything tied to that username can come up easily.</li>
<li>The same applies for the photos you post on your profile. A user can do a reverse image search and easily locate other websites where that photo is posted. So, in this case, it’s ok to go selfie crazy!</li>
<li>Set up a free email account to use with your dating account that has a unique name. Most sites offer their own in-site messaging that protects the anonymity of their members; however, people will often move their conversations to email or telephone as they get more friendly online.</li>
<li>When the time comes for a phone call, set up a free Google Voice account, which will generate a separate phone number and forward it to your mobile. That way you can protect your phone number until you feel comfortable enough to give it to your potential match.</li>
<li>When choosing an online dating site, be sure to choose a reputable, well known website. Research the sites you’re interested in. Some sites allow you to either delete or disable your account. Since users sometimes return to online dating, the site retains your information. Make sure you check these sites’ privacy policies and verify how data with these accounts are handled. Some dating sites make profiles public by default, which means that they can be indexed by search engines.</li>
</ul>
<p><strong>*About the Norton Online Dating Survey</strong></p>
<p>Norton by Symantec commissioned an online quantitative survey through Morar Consulting in October 2016, with 1,000 Australians aged 18 and over, of whom 494 had experienced online dating. The typical margin of statistical error is +/- 4.4% in the sample of 494 daters. The survey aimed to understand online dating risks and experiences of Australians.</p>
Sun, 12 Feb 2017 11:00:00 +0000https://community.norton.com/de/node/1427131LifeLock joins consumer business unit at Symantechttps://community.norton.com/de/node/1426431
<p>We announced some exciting news in November about Symantec’s plans to acquire LifeLock, and now I’m happy to share that the deal has closed and our integration with LifeLock, and its enterprise subsidiary ID Analytics, is underway.</p>
<p>There is a lot of passion and excitement from our combined team around the promise and potential we have together to provide a comprehensive digital safety platform that gives you, our customers, a greater sense of security with the addition of identity theft protection expertise.</p>
<p><img class="norton-image-center" src="/en/system/files/u2038063/phone-norton-lifelock%20copy.jpg">With this acquisition, Symantec is redefining what safety means in a connected world.</p>
<p>There has never been a greater need for an organization to step forward and help navigate this complex and rapidly evolving online landscape. Cybercriminals will continue to become more sophisticated and will always be looking for ways to access and steal personal information.</p>
<p>Our commitment is to be our customers’ online security champions and help protect their privacy, security, and now with the LifeLock acquisition, help protect their identity. Our experts will help consumers protect their digital information so they can take full advantage of the benefits of connected living.</p>
<p>We all live our lives online—whether shopping, searching or sharing with friends and family—and we want our customers to know we are here to help protect and defend their digital safety.</p>
<p>We are thrilled the deal is closed and we can move forward with the talented LifeLock and ID Analytics teams to help provide consumers with the technology, research and services they need to safely connect—anywhere and everywhere—from any of their devices and into the cloud. </p>
Thu, 09 Feb 2017 17:44:29 +0000https://community.norton.com/de/node/1426431The smarter home: How to cut the cord with a smart TVhttps://community.norton.com/de/node/1426061
<p>Have you heard about cutting the cord? It’s a way to replace cable television that has grown in popularity as more people are upgrading to Smart TVs and video streaming devices. Renting equipment from cable service providers can be costly, and for many cutting the cord can also cut the bill. If you’re on the fence here are a few tips to get you started and most importantly home network security best practices to consider. Smart TVs are making headlines for faulty security and privacy risks. So when you cut the cord, stream smarter and more secure. Here’s how: </p>
<p><img class="norton-image-center" src="/en/system/files/u2038063/tsh-cutting-the-cord-fb-2.jpg"></p>
<h4><strong>Step one: A smart TV</strong></h4>
<p>Smart TVs make it easier than ever to cut the cord. That’s because they come with native apps that make cutting cable basically seamless. Whether it’s a branded app for a streaming service like Netflix or YouTube, it is easy to watch digital-first programming from your Smart TV. No more watching your favorite shows on the small screen of a laptop. With most Smart TVs you can also browse the web. </p>
<h4><strong>Step two: Streaming services</strong></h4>
<p>Streaming services are key to cutting the cord. Almost everyone who is cutting the cord is using at least one major streaming service like Amazon Prime, Netflix or Hulu. On top of that, there are more specialized streaming services like those offered by sports networks or premium subscription cable channels.</p>
<h4><strong>Step three: A cord cutting device</strong></h4>
<p>You might be familiar with video streaming devices like Chromecast, Amazon Fire TV or Roku. These are devices that make it easier to cut the cord by delivering media to your television, no Smart TV required. These devices often come with a wide array of free apps and video content that you can download or stream. Out of the box setup is usually as easy as simply connecting to your home network, plug, and play. </p>
<p><strong>Step four: Stay safe</strong><br>
When you’re setting up a new device on your home network, you need to make sure that it’s safe. Remember, every internet connected device in the home is an access point to your network and your home security is only as strong as the weakest link. <a href="https://community.norton.com/en/blogs/security-covered-norton/flocker-ransomware-now-targeting-big-screen-android-smart-tvs">Smart TVs have lately some under fire for not having security protocols in place</a>. The best thing you can do to is to mind your home network security:</p>
<p>The key to keeping your home network safe is your router. For starters, always change the default password when you setup a new router out of the box. Keeping the default password can leave your home network exposed to hacking. Cybercriminals often have access to hardware password defaults, and can hack into a device with little effort.</p>
<p>Keep your Smart TV and streaming device software and apps updated. One of the main ways that hackers breach your system is by using known exploits in software. Updates patch these exploits. </p>
<p><strong>Protect what you can</strong><br>
The best way to defend all of your devices is to protect what comes in contact with your network. The router is essentially the front door to your online world. Over the past year at Norton, we've been keeping a close eye on the Internet of things threat landscape. We are seeing that IoT devices are now being attacked on an average of every two minutes. As a result, we're proud to announce the <a href="https://us.norton.com/core" target="_blank" rel="nofollow">brand new Norton Core router.</a>Available for <a href="https://us.norton.com/core-secure-router-select" target="_blank" rel="nofollow">pre-order now</a>, Norton Core is your “Digital Deadbolt” to your connected home. The first and only high performance, secure router with Norton protection bundled into it.</p>
<p>Another important way to get ahead of the bad guys is to participate in your own Internet security. Educate yourself about the threats out there and how they can affect you. Use security software, research your devices and secure them, and tell your friends to do the same! When more of us stay protected together, attackers will have fewer targets to take advantage of.</p>
<p>Cutting the cord can save you hundreds of dollars a month. It might cost a little bit to get you up and running, but once you are, you’ll be glad that you did. </p>
Thu, 09 Feb 2017 14:00:00 +0000https://community.norton.com/de/node/1426061How to Improve Your Wi-Fi Signal at Homehttps://community.norton.com/de/node/1425651
<p>Every day more of the country gets better, faster Wi-Fi coverage. But that doesn’t stop your signal at home from dropping off or grinding to a halt every now and then. Here are the latest tips from our top experts on how to get the most from your home Wi-Fi service.</p>
<p><img class="norton-image-center" src="/en/system/files/u7131691/800x300_Female_Couch_Desktop.jpg"><strong>Location, location, location</strong></p>
<p>Wi-Fi waves are a lot shorter than the ones used for radio and mobile phone data, so most routers can probably manage about 150 feet, while a radio mast can probably manage several miles.</p>
<p>Many routers transmit downwards or horizontally rather than upwards, so you’ll want to make sure your router is not on the floor because that won’t work well with the waves.</p>
<p>Other electronic devices can affect your signal too, so keep your router away from televisions, DVD players, and microwaves.</p>
<p>When using free Wi-Fi outside your home, the biggest challenge isn’t speed but making sure your data is safe from prying eyes. The best way to encrypt your information and keep private in public is a <a href="https://community.norton.com/en/blogs/norton-protection-blog/what-vpn-and-why-you-should-use-vpn-public-wi-fi">virtual private network</a>, or VPN. The Norton WiFi Privacy VPN creates a secure tunnel for any information you send or receive from your iOS and Android smartphones and tablets while connected to public Wi-Fi. Learn more about <a href="https://us.norton.com/wifi-privacy" rel="nofollow">Norton WiFi Privacy</a>.</p>
Tue, 07 Feb 2017 21:09:09 +0000https://community.norton.com/de/node/1425651Why Your Online Privacy Mattershttps://community.norton.com/de/node/1411021
<p><img src="/en/system/files/u7098741/DPD%20Social.png"></p>
<p>To understand the importance of privacy in the digital age, one must understand exactly what it is before it can be valued. There seems to be a good number of people in the “I’m not doing anything wrong, therefore, I have nothing to hide” camp. Well, we are here to bust that myth. The truth of the matter is, right or wrong, we have everything to hide.</p>
<p><strong>What Is Privacy?</strong></p>
<p>Privacy is closing your bedroom curtains when getting ready for bed. Privacy is visiting with your doctor behind closed doors. While in real life this type of privacy comes naturally, with little thought, in the digital space the idea of privacy is skewed. Mostly because people don’t really understand what digital privacy entails.</p>
<p><strong>What Exactly Are We Trying to Protect?</strong></p>
<p>People may assume it is all about what they are doing, which is a small piece of the picture. However, online privacy has less to do with what you are doing, and more to do with who you are AND what you are doing. On the Internet, data has high value. It’s stolen, sold, collected and analyzed.</p>
<p>There are many facets to privacy. There’s what you do, and who you are. Who you are is your personally identifiable information (PII), which is as it sounds--your name, date of birth, address, Social Security number, phone numbers and more. What you do are the searches you perform, the websites you visit, the articles you read, even what you buy online.</p>
<p>Whenever you download an app, visit a website or use a social media platform, chances are that company is collecting data on you. People are doing so much more online through their computers and mobile devices today. We make purchases, look up medical conditions, arrange vacations, interact with friends and relatives, just about anything imaginable. With these actions, people are inadvertently creating a huge digital paper trail of data about themselves. While it may not be PII, these companies still track what you do on the Web and collect that data in order to get a clearer picture of you.</p>
<p><strong>What Can Be Done With My Data?</strong><br>
A complete data set on an individual can fetch a pretty penny, completely legally, too. There are now companies known as “data brokers” that collect and maintain data on millions of people, which they analyze, package, and sell without the user’s knowledge or permission. Data brokers collect and sell information to other companies for many reasons, including targeted advertising, credit risk assessment, and direct marketing. Luckily, this data is usually anonymized, and does not contain PII.</p>
<p><strong>Why Is Privacy Important?</strong></p>
<p>We all have things to hide. It could be how much money you make, your medical records or your bank account number. Hiding things is not bad. I don’t think these are the types of things you’d like broadcasted on your social network for the entire world to see. This is why we must strive to protect our right to privacy.</p>
<p>Earlier this year, a young woman purchased a few nondescript items such as cotton balls, unscented lotion and some vitamins. Based on what the company already knew about her, they were able to correctly predict that she was pregnant, and began targeting her for baby items by sending her coupons in the mail. The issue? She was a teenage girl, and these coupons alerted her father (much to his dismay) that she was indeed pregnant.</p>
<p>The most important thing to remember about your privacy is that it is YOURS. It is your information, your habits and patterns, and your actions. Therefore you should want to protect it in any way possible.</p>
<p><strong>12 Tips to Help You Protect Your Privacy:</strong></p>
<p><strong>1. Secure your passwords.</strong></p>
<p>Passwords are the keys to our digital lives. Cybercriminals employ many tactics to try and crack them. To make this task difficult for them, use strong, complicated passwords.</p>
<ul>
<li>
<a href="https://community.norton.com/blogs/norton-protection-blog/how-choose-secure-password">A good password</a> should be at least eight characters long, and use a combination of uppercase and lowercase letters, numbers and symbols. Don’t use full words, names, addresses, phone numbers or any other easily identifiable personal information. Be sure to avoid using the same password across multiple websites as well.</li>
<li>
<a href="http://community.norton.com/en/blogs/norton-protection-blog/importance-two-factor-authentication">Two-Factor Authentication</a> (2FA), if available, is another way of verifying your identity other than just a username and password. 2FA is comprised of something you know (such as a password), something you have (a mobile phone that a code can be sent to), or something you are (such as a fingerprint).</li>
<li>Never save passwords on your device. Yes, it’s convenient. Yes, it saves time. But if you need to safely store passwords, look into a <a href="https://community.norton.com/en/blogs/norton-protection-blog/password-managers-are-key-secure-passwords">secure password manager</a>. Criminals are getting smarter and need just one chink in the armor to get into the system to rob you blind.</li>
</ul>
<p><strong>2. Be conscious of all privacy settings. </strong></p>
<p>Most apps offer privacy settings for users. This gives you the freedom to know how much and what kind of information is shared. Always choose the least amount of data sharing. Always be cautious when sharing your name and location. Turn off location services and deny access to your camera.</p>
<p>When it comes to social media, be sure to review your privacy settings. Most social media sites will give you options to select who you are sharing your information with. Be sure those settings are set for trusted individuals and friends, rather than set to public for the whole world to see. You can <a href="http://www.staysafeonline.org/data-privacy-day/check-your-privacy-settings/" rel="nofollow">check your privacy settings</a> on popular websites via the Data Privacy Day website.</p>
<p><strong>3. Be aware of your digital footprint.</strong><br>
Whatever you post online is there forever, even if you delete it from where it was originally posted. A digital footprint is somewhat of a digital paper trail. Forum registrations, videos, photos, just about anything you post will all leave traces of information about yourself online.</p>
<p><strong>4. Get reliable security for all of your devices.</strong><br>
In addition to protecting your computer from malware, a good security software program such as <a href="http://us.norton.com/norton-security-antivirus" rel="nofollow">Norton Security</a> will protect you from other threats on the Internet landscape. There are still many vulnerabilities out there such as phishing, spyware, rogue websites, adware, keyloggers and more.</p>
<p>Don’t forget: Phones need as much protection as any other device, if not more. There are many security providers that offer free services. These can be risky as they mine data from your phone. Always go for a well-known service provider. <a href="https://mobilesecurity.norton.com" rel="nofollow">Norton Mobile Security</a> has a gamut of features that can protect your phone from most threats.</p>
<p><strong>5. Back up your data</strong>.</p>
<p>Backing up data is often over looked. But it is a very important aspect of data protection. Ransomware is a type of attack where hackers hold your data hostage for a ransom. There are cloud-based services that offer backup. Or you can opt for <a href="http://us.norton.com/norton-security-with-backup" rel="nofollow">Norton Security Premium</a>, which includes backup.</p>
<p><strong>6. Anti-theft your device.</strong></p>
<p>If your gadget is lost or stolen, tracking apps will help you find it. But how do you protect your confidential data before it gets into the wrong hands? Norton Mobile Security allows This includes your , , , , and a</p>
<p><strong>7. Be careful what you do with your phone.</strong></p>
<p>While being cautious with what you do with you phone is always recommended, it can get tiresome. With the vast amount of <a href="https://community.norton.com/en/blogs/norton-protection-blog/malware-101-what-malware">malware</a>, Trojans, and worms finding sneaky ways to get into your device, it is better to stay protected with a security system that does the work for you. <a href="https://play.google.com/store/apps/details?id=com.symantec.mobilesecurity&amp;hl=en" rel="nofollow">App Advisor</a> is a special feature provided by Norton Mobile Security. It prompts privacy risks, intrusive behavior of apps, excessive battery drainage and data plan usage. It also has call/SMS blocking, anti-theft, contacts backup and protects your mobile phone from malware.</p>
<p><strong>8. Watch out for Bluetooth vulnerabilities.</strong></p>
<p>Bluetooth technology offers incredible convenience. It also opens doors for security weaknesses. Make sure you turn off your Bluetooth when you are not using it. While there are options to place your Bluetooth activity in an invisible or undetectable mode, there are some malicious apps that can change that mode and expose your device to threats. That’s one more reason to have a security system in place.</p>
<p><strong>9. Keep your operating system up to date.</strong></p>
<p>Software updates perform a myriad of tasks. They are available for both our operating systems and individual software programs. Performing these updates will deliver a multitude of revisions to your computer, such as adding new features, removing outdated features, updating drivers, delivering bug fixes, and most importantly, fixing security holes that have been discovered.</p>
<p><strong>10. Wise up to Wi-Fi</strong></p>
<p>Secure your home network. Change the default username and password on anything that connects to your network, especially your Internet router. Use Wi-Fi Protected Access (WPA), which will encrypt the data traveling through your network. Turn on all firewalls on both hardware and software programs.</p>
<p>While most home Wi-Fi connections are encrypted, some <a href="https://community.norton.com/en/blogs/norton-protection-blog/public-wi-fi-security-101-what-makes-public-wi-fi-vulnerable-attack-and">public Wi-Fi</a> connections are not. This <a href="https://us.norton.com/wifi-privacy" rel="nofollow">Norton WiFi Privacy</a></p>
<p><strong>11. Delete data that you no longer use.</strong></p>
<p>If you haven’t used a program in months- uninstall it. If you have a lot of old documents that you don’t access anymore, you can delete those as well, or store them offline on an external hard drive. These can be repositories of personal information that you may have forgotten about. If you haven’t used a program in a while, chances are it is outdated.</p>
<p><strong>12. Familiarize yourself with phishing.</strong></p>
<p><a href="https://community.norton.com/blogs/norton-protection-blog/how-protect-yourself-phishing-scams">Phishers</a> generally attempt to impersonate a well-known organization, such as a banking or financial institution, in order to try to obtain your user credentials, or deliver malware to your computer via suspicious links or attachments in email messages. Never click on attachments or links from unknown senders or from suspicious looking emails. Instead, if you think your account is in jeopardy, go directly to the website in question by typing the address into the URL bar in your browser rather than clicking the link in the message.</p>
Tue, 24 Jan 2017 18:31:51 +0000https://community.norton.com/de/node/1411021The Personal Impact of Cybercrimehttps://community.norton.com/de/node/1421841
<p><img class="norton-image-center" src="/en/system/files/u7098741/Personalimpact.jpg"></p>
<p>Fifty-one percent of people think that over the past five years it’s become harder to stay safe and secure online than in the real world. Yet, 689 million people in 21 countries experienced cybercrime within the last year alone. The reason for this staggering number is simple. Most people don’t take the right precautions to protect their digital lives. While some are unaware of online dangers others think it can be dealt with after it happens. The truth remains that cybercrime is evolving rapidly and impacting the daily and digital lives of people.</p>
<p>Revealed in a survey conducted last year, the Norton Cyber Security Insights Report explores consumers’ online behavior that leaves them vulnerable to threats.</p>
<p><strong>What is the Norton Cyber Security Insights Report?</strong></p>
<p>With new and emerging security threats developing every day, much has been written about the online crime landscape. The Norton Cyber Security Insights Report sets out to understand how consumers are personally impacted by cybercrime and puts a human face on the headlines dominating the news. This online survey of 20,907 consumers in 21 markets was commissioned by Norton by Symantec to give a global view of online crime and the toll it takes on consumers. You can download the full report<a href="https://www.symantec.com/content/dam/symantec/docs/reports/2016-norton-cyber-security-insights-report.pdf"> here.</a></p>
<p><strong>Key findings</strong></p>
<p><img class="norton-image-center" src="/en/system/files/u7098741/key-findings.png"></p>
<p>Here are a few facts and figures from the 2016 Norton Cyber Security Insights Report that will change the way you think about cyber security.</p>
<ul>
<li>Forty percent of Millennials report having experienced cybercrime in the past year.</li>
<li>Nearly three in 10 people cannot detect a phishing attack.</li>
<li>Another 13 percent have to guess between a real message and a phishing email, meaning four in 10 are vulnerable.</li>
<li>Eighty - six percent of people said they may have experienced a phishing incident.</li>
<li>7 in 10 consumers wish they could make their home Wi-Fi network more secure.</li>
<li>Yet only 27 percent believe it is likely their home Wi-Fi network could be compromised.</li>
</ul>
<p><strong>The Impact</strong></p>
<p><img class="norton-image-center" src="/en/system/files/u7098741/TheImpact.png"></p>
<p>Within the past year, cybercrime victims have spent $126 billion globally and lost 19.7 hours – the time it would take to fly from New York City to Los Angeles four times – dealing with cybercrime.</p>
<p>The number of connected devices has exponentially grown in the last year and there is a constant need to be connected. In fact, people are willing to engage in risky online behavior in order to simply access Wi-Fi.</p>
<p>People are also known to share their passwords with friends, access financial information via unsecured Wi-Fi connections and click on suspicious links thereby increasing the vulnerability of their connected devices. Eighty percent of the consumers who took a compromising action in response to a potential phishing incident experienced negative consequences, including identify theft, money stolen from bank accounts, credit cards opened in their name and unauthorized apps installed on their device.</p>
<p><strong>Precautions</strong></p>
<p>The findings from the Norton Cyber Security Insights Report reveal that despite having the resources and information to protect themselves, consumers continue to engage in unsafe online practices. By adopting a few basic behaviors, consumers can make big strides in mitigating cybercrime risk. Consider these behaviors to be a part of your daily routine like brushing your teeth or wearing a seatbelt.</p>
<ul>
<li>
<strong>Avoid password promiscuity:</strong> Protect your accounts with strong, unique passwords that use a combination of at least 10 upper and lowercase letters, symbols and numbers to help keep the bad guys at bay. Make it difficult for attackers to access your information by changing your passwords every three months and not reusing passwords for multiple accounts. That way, if a cybercriminal gets your password, they can’t compromise all of your accounts. And if it’s too overwhelming to keep up this practice, use a password manager to help!</li>
<li>
<strong>Don’t go on a phishing expedition:</strong> Think twice before opening unsolicited messages or attachments, particularly from people you don’t know, or clicking on random links. The message may be from a cybercriminal who has compromised your friend or family member’s email or social media accounts.</li>
<li>
<strong>Don’t keep a (dis)connected home:</strong> When installing a new network-connected device, such as a router or smart thermostat, remember to change the default password. If you don’t plan on using the Internet feature(s), such as with smart appliances, disable or protect remote access when not needed. Also, protect your wireless connections with strong Wi-Fi encryption so no one can easily view the data traveling between your devices. </li>
<li>
<strong>Be in control when online:</strong> Entrust your devices to security software to help protect you against the latest threats. Protect all your devices with a robust, multi- platform solution, like <a href="https://us.norton.com/norton-security-antivirus" rel="nofollow">Norton Security.</a>
</li>
</ul>
<ul>
<li>
<strong>Know the ins and out of public Wi-Fi networks:</strong> Accessing personal information on unprotected public Wi-Fi is like broadcasting your entire screen on TV – everything you do on a website or through an app, could potentially be exposed. Avoid anything that involves sharing your personal information (paying a bill online, logging in to social media accounts, paying for anything with a credit card, etc.).</li>
</ul>
<p>Learn more about the threat landscape and take the right precautions to stay safe <a href="https://us.norton.com/cyber-security-insights-2016" rel="nofollow">here.</a></p>
Mon, 23 Jan 2017 17:15:33 +0000https://community.norton.com/de/node/1421841Is Paying For Antivirus Software Worth It?https://community.norton.com/de/node/1418971
<p><img src="/en/system/files/u7098741/freevspaid1.jpg"></p>
<p>Our daily and digital lives overlap each other. Since our personal safety takes precedence over everything, it’s safe to say that our digital security is a close second.</p>
<p><strong>The price of digital safety</strong></p>
<p>It’s hard to put a price tag on digital safety. Take <a href="https://us.norton.com/internetsecurity-malware.html" rel="nofollow">malware</a> for example. These sneaky little codes find their way into your devices and transmit your personal information to computers far away that are operated by fraudsters. The end result could translate into anything from cybercriminals draining your bank account to holding all your information hostage by freezing your device and asking for a ransom.</p>
<p><strong>How much precaution is too much precaution?</strong></p>
<p>As in real life being cautious online can prevent a lot of trouble. However it’s not foolproof. When your information is stored in doctor’s offices, department store databases and credit unions, your information is only as safe as the weakest online security these companies use.</p>
<p>This brings us to the biggest challenge of Internet security – free vs paid Internet security.</p>
<p><strong>Free Antivirus Software</strong></p>
<p>It’s free. When on a tight budget this may help. But remember there is no such thing as a free meal. Free antivirus software comes with its own baggage.</p>
<p>While most free antivirus software comes with good rating, there is only so much it can do. It will provide basic level protection. You may have to upgrade to the paid form to get comprehensive coverage. Free software may not be able to keep up with the dynamic changes in the cyber landscape. Some of the free antivirus software come loaded with advertisements that may slow your device.</p>
<p>There is also the risk of disclosing your personal information and leaving your device open at the mercy of a free service. All your sensitive transactions, irreplaceable photos and files reside on your device. Putting your trust on a free service is putting too much at stake.</p>
<p><strong>Paid Antivirus Software</strong></p>
<p>Paid antivirus software has a lot to offer. It is backed with excellent customer support and guarantee. It not only defends against viruses, spyware, malware, it also safeguards your identity and online transactions. When you subscribe to a service like <a href="https://us.norton.com/norton-security-with-backup" rel="nofollow">Norton Security Premium</a> you get protection for multiple devices and it includes family safety features. That means your kids can explore the connected world safely. Also you get 25 GB of secure cloud storage for your PC. It also automatically backs up your photos, financial files and other important documents of your choice on your Windows PC. If your computer has a virus after you subscribe, a Norton expert will help keep your devices virus-free or give you a 100 % refund.</p>
<p>It is popularly believed that paid antivirus is for people who use their devices for more complex and high-end tasks. However the truth is cybercriminals are not just after your device any more. They are after the information on your device. They are capable of stealing your money, your identity and your information. What may seem unimportant to you can fetch a high price in the underground economy. With new threats like spyware and <a href="https://community.norton.com/en/blogs/norton-protection-blog/data-breaches-made-headlines-2016">data breaches</a> everyone is capable of becoming a prime target for cybercrime irrespective of how tech savvy they are. The best defense is to invest in a security suite that offers comprehensive protection and excellent customer support.</p>
<p><strong>Free or Paid? What’s the conclusion?</strong></p>
<p>When it comes to digital safety, buying an antivirus security suite is a small price to pay. With people spending countless hours and millions of dollars trying to fix what was lost due to security oversight buying a security suite seems like the best option. Letting the experts use state of the art technology to fight new threats for a small amount seems like the logical thing to do.</p>
<p>Learn more about the security options <a href="https://us.norton.com/norton-security-with-backup" rel="nofollow">Norton Security</a> can give you.</p>
Sat, 14 Jan 2017 16:05:21 +0000https://community.norton.com/de/node/1418971Top Ten Cyber Security Predictions for 2017https://community.norton.com/de/node/1409771
<p><img class="norton-image-center" src="/en/system/files/u2038063/Top%20Tips%201.png">The Internet threat landscape was booming last year for cybercriminals. <a href="https://community.norton.com/en/blogs/security-covered-by-norton">We reported on 54 major events in 2016</a>. And that’s not counting the little stuff. The threat landscape shifted slightly in the past year, and we have seen some new trends. However, some of the older ones are sticking around and still going strong.</p>
<h3><strong>New Threat Predictions for 2017</strong></h3>
<h4>
<strong>1. The Internet of Things</strong><br>
</h4>
<p>The First Major Attack on IoT Devices​<br>
2016 was the breakout year for attacks on IoT devices. In October, the <a href="https://community.norton.com/en/blogs/security-covered-norton/internet-really-did-break-today-and-heres-how-it-happened">first massive cyber attack involving IoT devices</a>, such as​ ​webcams and DVRs, occurred. The ​Mirai Botnet was unleashed, and it took down half the Internet in the United States ​for hours. Using what is called a Distributed Denial of Service (DDoS) attack, cybercriminals flooded one of the largest server companies in the world with massive amounts of traffic, bringing down the servers and websites hosted on them. It was discovered that tens of millions of computers were sending data to targeted websites, simultaneously. Shortly after the U.S. attack, the same botnet attacked Germany, disrupting services for over 900,000 Internet subscribers.</p>
<p><img class="norton-image-right" src="/en/system/files/u2038063/Iot1.jpg">​This particular strain of malware is not going away anytime soon. The malware itself is believed to be widely distributed on the black market, and hackers are offering established botnet armies for hire. The big surprise for users involved in this attack was realizing that connected devices have default usernames and passwords. Because of this fact, the attackers targeted certain devices that for which they had obtained the default usernames and passwords.</p>
<p>This threat is likely to continue given the increasing popularity of connected devices, but there are ways you can protect yourself. IoT devices, no matter how small they seem, are computers too! Do some research on your device to see if it has a default password. If it does, the manufacturer’s website should have instructions on how to change it.</p>
<p><strong>A new security solution for IoT vulnerabilities </strong>​<br>
​Over the past year, here at Norton, we've been keeping a close eye on the Internet of things threat landscape. As a result, we're proud to announce the <a href="https://us.norton.com/core" rel="nofollow">brand new Norton Core router</a>.</p>
<p>Unlike conventional routers, Norton Core was built to secure and protect connected homes. To provide strong wireless coverage, Norton Core has a unique antenna array inside a geodesic dome of interlocking faces, inspired by defense and weather radars deployed in the extreme reaches of the globe. Norton Core’s unique mathematical design encourages users to place it out in the open, as part of their home décor, providing a strong, unobstructed Wi-Fi signal.<br>
</p>
<p><strong>IoT Ransomware</strong><br>
In addition to the Mirai Botnet targeting IoT devices, we also saw a <a href="https://community.norton.com/en/blogs/security-covered-norton/flocker-ransomware-now-targeting-big-screen-android-smart-tvs">new ransomware threat that affected smart TVs</a>. FLocker (short for "Frantic Locker") ransomware was capable of locking up an Android-based television. This particular ransomware strain is not new, as it has been posing a threat to Android smartphones since May of 2015. However, this particular strain made the jump to smart TVs running android OS in 2016. Luckily, this variant of malware does not encrypt files on the infected television. However, it does lock the screen, preventing the user from watching TV. </p>
<p>The continued targeting of smart devices by cybercriminals is our top threat prediction for 2017. With all these new attacks starting to ramp up in late 2016, we can only expect to see more of attacks on these devices in 2017.</p>
<h4> </h4>
<h4>
<strong>2. The Apple Threat Landscape </strong> <br>
</h4>
<p><img class="norton-image-left" src="/en/system/files/u2038063/apple.png">The Apple threat landscape was extremely busy in 2016. We reported on seven major stories in 2016. In 2015, we saw quite a few proof of concepts, but 2016 brought more threats out into the wild. These are the same threats that are affecting Windows and Android devices.</p>
<p><strong>Fake Apps Do Exist for iPhones</strong><br>
Cybercriminals <a href="https://community.norton.com/en/blogs/security-covered-norton/apple-removes-hundreds-fake-shopping-apps-right-holiday-shopping">sneaked fake shopping apps into the app store</a> right before the holiday season. While Apple has a rigorous vetting process for their apps, these scammers got tricky and updated the apps with malware after Apple approved them for the App Store.</p>
<p><strong>Spyware Is Everywhere</strong><br>
In addition to fake apps, 2016 saw the <a href="https://community.norton.com/en/blogs/security-covered-norton/first-targeted-iphone-spyware-discovered-update-your-ios-software">first targeted spyware released in the wild for iOS</a>. Researchers discovered that a highly sophisticated cyber espionage group deployed a very rare, advanced form of spyware, which can break an iPhone wide open. The spyware, known as Pegasus, is distributed by sending a link to a malicious website via text message. The good news: Apple has already pushed out the update to the vulnerability.</p>
<p><strong>iOS Bugs Are Ramping Up</strong><br>
Also on the iOS platform, there were three major vulnerabilities to keep an eye on. <a href="https://community.norton.com/en/blogs/security-covered-norton/new-software-updates-apple-address-two-critical-vulnerabilities">Researchers discovered a way to break the encryption used by iMessage </a>that could allow attackers to access and steal attachments such as images, videos and documents that are being shared securely with contacts.</p>
<p>The <a href="https://community.norton.com/en/blogs/security-covered-norton/new-software-updates-apple-address-two-critical-vulnerabilities">second vulnerability discovered</a> involves the handling of PDF documents. An attacker could send you a booby-trapped PDF that would then cause malicious code to run on your iPhone.</p>
<p>The third involves the <a href="https://community.norton.com/en/blogs/security-covered-norton/ios-device-users-should-update-921-now">fix of a three-year old cookie theft bug</a>. Cookies are small files that contain various types of data that remember a user, and are placed on your computer or mobile device by websites you visit. This flaw can allow hackers to impersonate users and steal sensitive information by creating a malicious public Wi-Fi network. The hackers then wait for a compromised user to join the network and redirect them to a malicious website designed to steal user credentials. From there, the hacker would be able to open the embedded browser screen you would see when joining a public Wi-Fi network, load content into a user’s phone and execute it without them knowing.</p>
<p><strong>Mac Ransomware--It’s Happening!</strong><br>
In March of 2016 Apple customers were the targets of the <a href="https://community.norton.com/en/blogs/security-covered-norton/first-mac-ransomware-targets-apple-users">first Mac-focused ransomware campaign</a> executed by cybercriminals. In this instance, it was the first time that cybercriminals used malware to execute real-life attacks. <br><br>
In this particular case, users were downloading a program called “Transmission for BitTorrent,” which is used for peer-to-peer file sharing. Users downloaded a “bad” version of the installer for the software, which contained a malicious Trojan horse, known as <a href="http://www.symantec.com/security_response/writeup.jsp?docid=2016-030705-4930-99"><strong>OSX.Keranger</strong></a><strong>. </strong>A Trojan horse is malicious software that can wreak havoc with data in many ways--such as the deletion, modification, copying, and stealing of data--as well as implant ransomware on the device. Like most ransomware, OSX.Keranger will encrypt a user’s files and demand a fee to release them.</p>
<p><strong>Not Just Macs and iPhones Anymore</strong><br>
2016 also brought the <a href="https://community.norton.com/en/blogs/security-covered-norton/apple-patches-critical-vulnerability-airport-devices">first major issue to Apple’s AirPort routers</a>. Apple discovered vulnerabilities in the firmware of AirPorts that could allow attackers to execute commands on the affected devices and infiltrate home networks. If your AirPort is flashing yellow, go update your firmware now!</p>
<p>This just goes to show that Apple products do need security software, now more than ever. You can protect your Mac against these threats and more with <a href="https://us.norton.com/norton-security-with-backup" rel="nofollow">Norton Security Premium</a>.</p>
<h4>
<strong>3. </strong><strong>Man in the Middle Attacks</strong>
</h4>
<p><img class="norton-image-right" src="/en/system/files/u2038063/mitm.png">2016 was also a big year for Man-in-the-Middle (MitM) attacks. An MitM attack employs the use of an unsecured or poorly secured, usually public, Wi-Fi router. The hacker scans the router using special code looking for certain weaknesses such as default or poor password use. Once a vulnerability is discovered, the attacker will then insert themself in between the users’ computer and the websites the user visits to intercept the messages being transmitted between the two.</p>
<p>A lot of these attacks take place on public Wi-Fi hotspots. Since most of these networks are unsecured, it’s easy pickings for cybercriminals. In addition to unsecured hotspots, hackers will also set up legitimate-looking Wi-Fi networks in order to lure unsuspecting users to connect and give them full access to their device.</p>
<p>Norton WiFi Privacy is a VPN that encrypts all the information sent and received by your mobile device while you’re on public Wi-Fi, making your public connection private. <a href="https://us.norton.com/wifi-privacy" rel="nofollow">Download Norton WiFi Privacy now.</a></p>
<h4>
<strong>4. </strong><strong>Android, Android, Android!</strong>
</h4>
<p>In 2016, we reported on six major Android events. The top three threats we saw involved fake apps, botnets, and, of course, ransomware.</p>
<p><strong>Bad Apps</strong><br>
Hundreds of malicious applications <a href="https://community.norton.com/en/blogs/security-covered-norton/hundreds-android-apps-containing-dresscode-malware-hiding-google-play">showed up on the Google Play store in October</a>, disguised as legitimate applications. These malicious apps were carrying malware known as Dresscode. Dresscode is designed to infiltrate networks and steal data. It can also add infected devices to botnets, which carry out denial-of-service (DDoS) attacks as well as take part in spam email campaigns.</p>
<p><strong>Android Botnets</strong><br>
Android smartphone users should be aware of a <a href="https://community.norton.com/en/blogs/security-covered-norton/mazar-bot-malware-invades-and-erases-android-devices">dangerous new type of malware that spreads via spam SMS or MMS messages</a>. The Mazar BOT, as it is called, tricks the Android user into providing administrative access to the infected Android phone and can then erase any stored data. Although security research experts believe this malware has several hidden capabilities that are still being discovered, they know this malware will turn your smartphone into part of a hacker botnet web.</p>
<p><strong>Mobile Ransomware</strong><br>
In 2016 there was a lot of mobile ransomware rampant on the threat landscape. Most notably, there were two that left devices completely vulnerable.</p>
<p><a href="https://community.norton.com/en/blogs/security-covered-norton/variant-android-ransomware-uses-shady-tactics-trick-users-giving-away">One variant of Android ransomware uses what is called “clickjacking” tactics</a> to try and trick users into giving the malware device administrator rights. Clickjacking occurs when attackers conceal hyperlinks beneath legitimate content, tricking the user into performing actions of which they are unaware. Users stumble upon these illegitimate links, assuming that when they fill out a field, click on a link, or type in their passwords they’re gaining access to what they see in front of them.</p>
<p><a href="https://community.norton.com/en/blogs/security-covered-norton/android-lockdroid-variants-target-western-regions-and-japan">Android.Lockdroid was spotted on March 11, 2016</a>, and disguised itself as a system update. What’s different about this particular strain is that once the ransomware detects that it’s installed on a device in a certain country, it displays the ransom message in that country’s language. This is the first type of “chameleon” ransomware we’ve spotted. In general, Android.Lockdroid needs to be manually downloaded by the user from adult sites to infect devices. It could also automatically arrive on the device when the user clicks on advertising links, which is known as malvertising, a form of malicious advertising.</p>
<p>Taking advantage of quality security software such as <a href="https://play.google.com/store/apps/details?id=com.symantec.mobilesecurity&amp;hl=en" rel="nofollow">Norton Mobile Security, </a>is an important measure that protects your device from malicious apps. With Norton Mobile Security, you can use our app advisor to scan for “bad apps” before downloading them to your phone. Norton App Advisor is a special feature included with Norton Mobile Security. It warns of privacy risks, intrusive behavior of apps, excessive battery drainage and data plan usage. It also features call and SMS blocking, anti-theft, contacts backup and protects your mobile phone from malware.</p>
<h4>
<strong>5. </strong><strong>Malicious Sites, Drive-by-Downloads and Malvertising </strong>
</h4>
<p>Malvertising is a combined term for malicious advertising, and uses legitimate online advertising services to spread malware. Malvertising requires placing malware-infected advertisements on regular Web pages through authentic online advertising networks in order to infect a device through the Web browser. Malvertising can affect ANY device--PC, Mac, Android, etc.</p>
<p>In March of 2016 <a href="https://community.norton.com/en/blogs/security-covered-norton/major-news-sites-hit-large-scale-malvertising-campaign">several mainstream websites fell victim to a massive malvertising campaign.</a> The tainted ads in these websites directed thousands of unsuspecting users to a landing page hosting the notorious Angler Exploit Kit, a kit that stealthily installs crypto-ransomware.</p>
<p><strong>Malicious Websites and Drive-by-Downloads</strong><br>
A drive-by-download is a download that occurs when a user visits a malicious website that is hosting an exploit kit. There is no interaction needed on the user’s part other than visiting the infected webpage. The exploit kit will look for a vulnerability in the software of the browser and inject malware via the security hole. <a href="https://community.norton.com/en/blogs/security-covered-norton/thousands-websites-have-been-compromised-malicious-code">Symantec identified thousands of websites in 2016</a> that had been compromised with malicious code. Of the compromised websites, 75 percent were located in the U.S.<br><br>
Defensive software such as <a href="https://us.norton.com/norton-security-with-backup" rel="nofollow">Norton Security</a> will prevent known drive-by downloads and warn you when you try to visit a malicious website.</p>
<p>If you are unsure about the credibility of a website you can also use <a href="https://safeweb.norton.com/" rel="nofollow">Norton Safe Web</a>, a free online tool, that can help identify risky websites as you browse the Web.<br>
</p>
<h4>
<strong>6. </strong><strong>Social Media Scams</strong>
</h4>
<p>In 2016, Facebook reported that it had 1.71 billion monthly active Facebook users. Twitter has 313 million monthly active users. With so many active users, popular social sites are a <a href="https://community.norton.com/en/blogs/security-covered-norton/beware-hacked-twitter-accounts-posting-links-adult-dating-and-sex">scammer's paradise</a>. The motives are the same: scammers try to exploit these stories for any kind of financial gain possible.</p>
<p>Scammers will try to entice you into clicking by posting sensational or emotional breaking news stories, sometimes capitalizing on a recent news event, or making up a fake, shocking news story. When you click on the link, you get a notification that you need to download a plug-in in order to view the video. Click on it and you could be downloading spyware that will stay on your device and collect personal information that could be used for identity theft. Remember to delete emails from unknown senders and don’t download unknown plug-ins.</p>
<h4>
<img class="norton-image-right" src="/en/system/files/u2038063/tax.png"><strong>7. Tax Scams and Identity Theft</strong>
</h4>
<p>It’s important to realize that tax documents contain a plethora of personally identifiable information about people, such as wage information, Social Security numbers, home addresses and place of employment. Once these documents are obtained, the criminals would have everything they need to <a href="https://community.norton.com/en/blogs/security-covered-norton/four-tax-scams-watch-out-tax-season">perform tax refund fraud</a>; effectively stealing tax refunds owed to others. Because these documents contain a plethora of information, they can help the scammers commit identity fraud In addition to tax refund fraud.<br><br>
Examples of phishing emails to be on the lookout for:</p>
<ul>
<li>Fake IRS and TurboTax emails claiming the recipient’s tax refund is restricted or their account has been locked</li>
<li>Fake IRS-branded emails asking the recipient to update their tax filing information</li>
<li>Fake email claims saying a tax payment was deducted and includes a “receipt”</li>
<li>Fake email from the IRS seeking proof of identity documents because “You are eligible to receive a refund”</li>
<li><a href="https://community.norton.com/en/blogs/security-covered-norton/beware-w2-phishing-emails-targeting-employees">W2 phishing emails targeting employees</a></li>
</ul>
<h3><strong>Existing Trends Coming Back for More</strong></h3>
<h4>
<img class="norton-image-left" src="/en/system/files/u2038063/NSOS_GettyImages-547016851.jpg"><strong>8. Ransomware: </strong>
</h4>
<p><a href="https://community.norton.com/en/blogs/security-covered-norton/ransomware-%E2%80%93-what-can-you-do-about-it">Ransomware is here to stay</a>. The first known case of ransomware popped up in 2013, and hackers have latched on to this tactic, refining it over the years. In 2016 we reported on eight major ransomware campaigns, which affected everything: Macs, Windows computers, Android platforms and more.</p>
<p>This year, we saw some notably new forms of ransomware, which just goes to show that cybercriminals are trying to “up their game” in extorting money from you.</p>
<p>The most unique form of ransomware we saw was the <a href="https://community.norton.com/en/blogs/security-covered-norton/jigsaw-ransomware-wants-play-game-not-good-way">Jigsaw ransomware</a>. This is not your average ransomware. Like other ransomware, Jigsaw will encrypt your files and demand a ransom in order to retrieve your files; however, it also comes with a countdown timer. During the first 24 hours it will start deleting a few files every hour. On the second day, the ransomware will delete hundreds of files, on the third day it will delete thousands--until the ransom is paid. Additionally, if you try to tamper with the ransomware or even restart your computer, it will delete 1,000 files as a “punishment.”</p>
<p>Whatever happens in ANY case of ransomware, do NOT pay the ransom, and be sure to keep regular backups to help protect your data in case you become a victim of ransomware.<br><br>
Need backup? <a href="http://us.norton.com/norton-security-with-backup" rel="nofollow">Norton Security Premium</a> offers you an easy way to help defend against ransomware as well as a convenient backup solution.</p>
<h4>
<strong>9. </strong><strong>Software Vulnerabilities and Software Updates:</strong>
</h4>
<p>Major software vulnerabilities continued to be a huge problem in 2016. Attackers heavily rely upon these vulnerabilities, as it is the easiest way to sneak malware into a user’s device unnoticed, with little action on the user’s part.</p>
<p>We reported on six major vulnerabilities in 2016- including an <a href="https://community.norton.com/en/blogs/security-covered-norton/adobe-releases-patch-25-flash-flaws">Adobe patch for 25 flaws</a>, as well as <a href="https://community.norton.com/en/blogs/security-covered-norton/adobe-issues-emergency-patch-newly-discovered-flash-vulnerability">quite</a> <a href="https://community.norton.com/en/blogs/security-covered-norton/super-patch-tuesday-microsoft-and-adobe-release-slew-patches-various">a</a> <a href="https://community.norton.com/en/blogs/security-covered-norton/attackers-are-exploiting-new-adobe-flash-zero-day-vulnerability">few</a> other emergency patches from them as well.</p>
<p>The best way to combat against these attacks is to perform any and all <a href="https://community.norton.com/en/blogs/norton-protection-blog/importance-general-software-updates-and-patches">software updates</a> as soon as they are available. Software updates will patch those security holes attackers exploit, add new features and improve bug fixes.</p>
<h4><strong>10. 2016 Was a Banner Year for Mega Data Breaches </strong></h4>
<p><img class="norton-image-left" src="/en/system/files/u2038063/DB.png">​Unfortunately, data breaches are almost as common as malware outbreaks. In 2016 there were eight mega-breaches involving major companies.<br>
Most recently, in December,<a href="https://community.norton.com/en/blogs/security-covered-norton/over-1-million-google-accounts-breached-malicious-android-apps"> over 1 million Google accounts were breached via malicious Android apps</a>. This attack was particularly nasty because the only way to completely remove this malware from an infected device is to do a clean installation of the operating system. This is a complicated process, but mobile carriers can perform the installation for users.</p>
<p>However, topping the list for the most accounts breached was Yahoo, with a whopping total of 1.5 billion users. Yahoo announced this year that they had been the victim of two separate cyber attacks that occurred in 2014. The first breach that was announced<a href="https://community.norton.com/en/blogs/security-covered-norton/yahoo-announces-data-breach-affecting-500-million-users"> stole information associated with 500 million accounts</a>. The <a href="https://community.norton.com/en/blogs/security-covered-norton/yahoo-announces-breach-one-billion-accounts">second breach, which is now the largest data breach in history</a>, stole information from one billion accounts.</p>
<p>The second largest data breach of 2016 was from FriendFinder Networks Inc., which involved a<a href="https://community.norton.com/en/blogs/security-covered-norton/over-400-million-accounts-breached-friendfinder-networks-inc"> breach of over 400 million accounts</a>. 1<a href="https://community.norton.com/en/blogs/security-covered-norton/time-change-your-linkedin-passwords-117-million-credentials-have-been">17 million LinkedIn user credentials</a> were also snagged in 2016, and<a href="https://community.norton.com/en/blogs/security-covered-norton/dropbox-has-verified-68-million-user-credentials-have-been-exposed"> Dropbox verified that 68 million credentials were also stolen last year</a>.</p>
<p>Big data is big money for attackers, so they set their sights on companies that tend to hold large amounts of personally identifiable data on their customers, such as Social Security numbers, birthdates, home addresses and even medical records. It’s easy for a cybercrime victim to report credit card fraud and just get a new number. When it comes to a Social Security number, though, you are bound to it for life. And Social Security numbers open the door to all sorts of identity theft.</p>
Mon, 09 Jan 2017 19:06:26 +0000https://community.norton.com/de/node/1409771Norton Introduces Elegantly Designed Norton Core- A Digital Safety Solution for Connected Homeshttps://community.norton.com/de/node/1414821
<p><img class="norton-image-left" src="/en/system/files/u2038063/rover-instagram.png">New High-Performance Wi-Fi Router, Built from The Ground Up to Secure Home Networks and IoT Devices, Will Come Bundled with Subscription to Award-Winning Norton Security</p>
<p><strong>Mountain View, Calif. – Jan. 3, 2017</strong> – Building on a heritage of industry-leading and award-winning security software, Norton by Symantec (NASDAQ: SYMC) today changed the future of digital safety with the announcement of Norton Core. Norton Core is a uniquely-designed, high-performance Wi-Fi router that is available for <a href="https://us.norton.com/core" rel="nofollow">pre-orders</a> today and will change the way people secure their connected homes.</p>
<p>Today’s home networks, bursting with connected devices, thermostats, smart televisions and refrigerators, need exceptional security to protect against malware, viruses, and suspicious activity. Yet, many consumers don’t understand these devices can be an easy on-ramp for hackers to access their home networks. The <a href="https://us.norton.com/cyber-security-insights-2016" rel="nofollow">Norton Cyber Security Insights Report</a> found 65 percent of U.S. consumers believe connected devices are made with security in mind, even though Symantec uncovered vulnerabilities in more than 50 different categories of IoT devices.</p>
<p>“We’ve all seen the high-profile attacks in recent months and know that hackers are now exploiting an array of connected devices as a new means to access personal and financial information,” said Fran Rosch, executive vice president, Consumer Business Unit, Symantec. “Norton is extending our digital safety platform in an innovative way – to now include a wireless home router with an atypical artisanal design – to help our customers incorporate security more personally and elegantly into their homes.”</p>
<h3><strong>Designed for connected homes</strong></h3>
<p>Unlike conventional routers, Norton Core was built to secure and protect connected homes. To provide strong wireless coverage, Norton Core has a unique antenna array inside a geodesic dome of interlocking faces, inspired by defense and weather radars deployed in the extreme reaches of the globe. Norton Core’s unique mathematical design encourages users to place it out in the open, as part of their home décor, providing a strong, unobstructed Wi-Fi signal.</p>
<h3><strong>Superior and customizable parental controls</strong></h3>
<p>Norton Core comes with convenient and customizable tools allowing users the flexibility to set parameters that work for their home. Parents can easily set limits for each child for daily internet use, filter out inappropriate content, and even pause the entire home network so the family can enjoy dinner together. If an attempt is made to visit an unauthorized site, access will be blocked and parents will receive a notification.</p>
<p>“As more and more consumers are automating their lives at home, there are many considerations to evaluate with regard to how protected their data is, what data is being shared from their connected devices, and how their connected devices are managed within their home,” said Robert Westervelt, Research Manager, IDC. “There are potential pitfalls that come with the convenience of home connectivity, but consumers can take steps to protect themselves and their devices with the right level of security.”</p>
<h3><strong>Unparalleled performance, security and complete digital safety</strong></h3>
<p>Norton Core fundamentally changes the equation as it is built consciously, with security as the primary consideration. From data encryption, to secure DNS, to automatic security updates, Norton Core will secure connected homes with state of the art security.</p>
<p>Norton Core is designed with speed, coverage, reliability, ease of use and security as top considerations for all of the notebooks, smartphones, tablets, smart TVs, gaming consoles, Wi-Fi thermostats, IP cameras and other connected devices in a home. A few key product highlights include:</p>
<ul>
<li>
<strong>Superior wireless performance:</strong> Norton Core will support Wave 2 Wi-Fi and will be powered by a 1.7 GHz dual core processor, with ample memory and flash storage to ensure optimal performance for Wi-Fi and security features. Norton Core will simultaneously transmit at 2.4 GHz and 5 GHz, so every device connects to the best available band. Norton Core will also support speeds up to 2.5 Gbps, for fast 4K streaming and lag-free gaming. Using MU-MIMO technology, Norton Core can simultaneously stream to multiple devices, providing maximum bandwidth.</li>
<li>
<strong>Advanced Security</strong>: With security at the heart of Norton Core, every network packet incoming and outgoing across the home network is scanned for malware, viruses, spam, intrusions, and much more. If a connected device is detected with known vulnerabilities or threats, Norton Core can immediately quarantine the device to a segregated network and send an alert to the user.</li>
<li>
<strong>Security Score</strong>: To help consumers manage their connected home security, Norton Core is introducing “Security Score.” This feature is like a “credit score” for home network security. Users will be able to quickly understand how secure their network and devices are in real-time, and are given tips to strengthen their security settings and improve their score.</li>
<li>
<strong>Easy to manage: </strong>Users can manage and monitor their home network directly from their connected mobile devices. With a single tap, the home screen will display the security score, show the number of threats blocked, and the number of devices currently connected to a home network. Using the app, consumers can remotely adjust Wi-Fi settings and block suspicious behavior.</li>
<li>
<strong>Secure guest access:</strong> Norton Core makes it easy to set up and create a secure guest network with a few easy clicks. For added protection, guest access can be set for a specific duration, so when it expires, the guest can no longer connect.</li>
<li>
<strong>Automatic updates: </strong>Norton Core protection stays new and current by automatically updating itself with the newest features and the latest security updates, without interrupting the connection.</li>
</ul>
<h3><strong>Availability</strong></h3>
<p>Norton Core is available for <a href="https://us.norton.com/core" rel="nofollow">pre-orders</a> for a limited time at $199.99 ($279.99 MSRP), bundled with a one-year complimentary subscription to Norton Core Security Plus. With protection for up to 20 PCs, Macs, Android and iOS smartphones and tablets, plus unlimited IoT devices, Norton Core can be pre-ordered in two distinct colors: Titanium Gold or Granite Gray. Norton Core is planned to begin shipping in the United States in summer 2017, with plans to expand globally. To learn more, visit <a href="https://us.norton.com/core" rel="nofollow">us.norton.com/core</a>.</p>
Tue, 03 Jan 2017 16:21:21 +0000https://community.norton.com/de/node/1414821The Smarter Home: How to Create a Smart Homehttps://community.norton.com/de/node/1393661
<p>Internet of Things gadgets aren’t just for toys for techies. They are actually more accessible by cost and ease of use, and people are finding convenience in creating a “smart home” with connected things.</p>
<p>However, convenience does not come without risk. One of the key security concerns with smart homes is ensuring that devices are not vulnerable to hacking and cyber attack. Let’s take a look at how-to create a smart home while following cybersecurity best practices.</p>
<p><img src="/en/system/files/u1694783/SmartHomeSecurity-infog-7.1fnl_0.png"></p>
<p><strong>What Is a Smart Home?</strong><br>
While the term “Smart Home” has been used a lot these days, especially with the rapid emergence of “smart devices” for the home. So what exactly is a smart home, anyway?</p>
<p>A smart home is a home that contains devices and appliances that are connected to the Internet. These “smart devices” can range from washing machines to coffee makers. While most of these individual products can be controlled by an app on a smartphone, most users opt for what’s called a smart home hub. This is a central device that connects to your Internet router and will act as a “home base” communicating with, and controlling all your other Internet connected smart home gadgets. These devices are usually voice activated and help to automate the connected home experience</p>
<p>Now that you know what a smart home is, why would you want to connect your home to the Internet?</p>
<p><strong>Smart Home Convenience and Cost Savings:</strong><br>
Imagine coming home from the market, hands full, yet, your phone unlocks your front door, and you can tell your smart hub to turn on the lights. Or, being able to adjust the blinds in your bedroom without getting up, double-checking that the front door has been locked when you have already left home and so much more. The automation capabilities of a smart home can be both time saving and give you peace of mind.</p>
<ul>
<li>Automate lights and energy systems (heating and cooling) will help save money.</li>
<li>Install a smart home security system for a fraction of the cost of a traditional system.</li>
<li>Hands-free operation of many appliances in your home. Smart appliances will let you know when they’re having trouble. Moisture sensors can protect your investment by letting you know when there’s moisture accumulating and causing trouble.</li>
</ul>
<p><strong>Keeping Your Smart Home Safe</strong><br>
One of the most important things to remember when setting up a smart home is that you can open yourself up to series of cybersecurity threats. Your home network is only as strong as its weakest link. So when you start adding a host of new devices you’re going to want to make sure those devices are secure. How do you do that?</p>
<p><strong>Start at the “front door” –your router.</strong><br>
Take a look at your router. Is it the regular one you get from your cable company? If so, you may want to do some research on it- it may not be as secure as you think.</p>
<ul>
<li>Make sure your router isn’t using the default password it came from the factory with. Those passwords are easily accessible online by doing a simple Google search.</li>
<li>Be sure your router has a secure password. It’s important to choose a password you won’t forget and that’s also difficult to guess.</li>
<li>You should also use WPA2 and AES encryption for your router whenever possible, as these provide the highest level of protection for your wireless network. </li>
</ul>
<p><strong>You’re not stuck with the router your Internet provider gave you.</strong><br>
Look into getting a more secure router. Using your own router can help you beef up your network security as well as cut down on costs on your Internet bill. Most Internet service providers provide the equipment to you for a small monthly fee.</p>
<p>Over the past year at Norton, we've been keeping a close eye on the Internet of things threat landscape. We are seeing that IoT devices are now being attacked on an average of every two minutes. As a result, we're proud to announce the <a href="https://us.norton.com/core" rel="nofollow">brand new Norton Core router</a>.</p>
<p>Built from the ground up, Norton Core is your “Digital Deadbolt” to your connected home. The first and only high performance, secure router with Norton protection bundled into it.<br>
</p>
<p><strong>Smart shopping for smart devices.</strong><br>
The <a href="https://us.norton.com/cyber-security-insights-2016" rel="nofollow">Norton Cyber Security Insights Report</a> found 65 percent of U.S. consumers believe connected devices are made with security in mind, even though Symantec uncovered vulnerabilities in more than 50 different categories of IoT devices.</p>
<p><strong>Research. Research. Research.</strong><br>
The market for IoT devices is extremely competitive, therefore giving consumers multiple choices of the same kind of device.</p>
<p>Connected devices are all the rage, so there will be lots of new companies entering the market focusing on getting their devices out quickly, and may not have security in mind. While we do not discourage you from buying these devices from newer companies, make sure they are security-focused. Go to the manufacturers’ website and review their privacy policy, terms of use and learn what data they collect on you, and how they safeguard it.</p>
<p>While these gadgets may seem innocuous, they all have tiny computers in them, collecting all sorts of data in order to improve functionality. Smart thermostats need location data as well as contain movement sensors to learn your habits. Smart home hubs can record your voice commands as a part of “machine learning” and store that data as well. While it’s not bad to use this kind of data, you definitely want to make sure manufacturers are securing that sensitive data.</p>
<p><strong>“D.I.Y” Security</strong><br>
Since all these devices have computers in them, they are vulnerable. Keep your entire system updated, from your smart home devices to your laptops and tablets. Hackers often use known exploits to try and get into your home system. A lot of these devices can come with default passwords, like routers do. Look into if your device has a login, and if so, change the password to something complicated and unique to the device.</p>
<p>When you make your home smart, the risks become a lot higher, but by learning about the security of the devices you purchase, you can help mitigate those risks even further.</p>
<p><br><a href="https://us.norton.com/core" rel="nofollow"><img src="/en/system/files/u2038063/Norton%20Core%20FB%20CTA1.jpg"></a></p>
<p><strong>Save</strong><strong>Save</strong></p>
Sun, 01 Jan 2017 18:23:16 +0000https://community.norton.com/de/node/1393661Data Breaches That Made Headlines in 2016https://community.norton.com/de/node/1413211
<p><img src="/en/system/files/u7098741/Title_Card.jpg"></p>
<p>980 data breaches occurred in 2016. That left an approximate 35,233,317 known records exposed. Over the years, data breaches have become more sophisticated, and cybercriminals target both large corporations and small businesses.</p>
<p>2016 saw a string of data breaches that left sensitive information of millions of people at the mercy of cybercriminals. In addition to financial consequences, these data breaches ruined customer trust and the reputation of the companies in question.</p>
<p>As we look back at 2016 here are some of the most impactful data breaches that shook the world.</p>
<p><a href="https://community.norton.com/en/blogs/security-covered-norton/time-change-your-linkedin-passwords-117-million-credentials-have-been"><strong>117 Million LinkedIn Credentials Breached</strong></a></p>
<p><img class="norton-image-center" src="/en/system/files/u7098741/LinkedIn_117_Million.jpg">Even though the breach occurred in 2012, its intensity came to light in mid-2016. A Russian hacker going by the name of “Peace” claimed responsibility for the 2012 hack. In 2016 the hacker resurfaced, and set up shop on the <u><a href="https://community.norton.com/en/blogs/norton-protection-blog/what-deep-dark-web-30sectech">Dark Web</a></u> to sell a whopping 117 million credentials that were acquired from the same breach.</p>
<p><strong><a href="https://community.norton.com/en/blogs/security-covered-norton/dropbox-has-verified-68-million-user-credentials-have-been-exposed">Dropbox Verifies 68 Million User Credentials Have Been Exposed</a></strong></p>
<p><img src="/en/system/files/u7098741/Dropbox_Alert_Aug2016.jpg"></p>
<p>In September 2016, Dropbox found out that 68 million user credentials had been exposed since 2012. They proactively swung into action to prevent any further damage. They completed a password reset for anyone who hadn’t updated their password since mid-2012.</p>
<p><a href="https://community.norton.com/en/blogs/security-covered-norton/yahoo-annunces-breach-one-billion-accounts"><strong>Yahoo Announces Breach of One Billion Accounts</strong></a></p>
<p><img class="norton-image-center" src="/en/system/files/u7098741/Yahoo_One_Billion%202.jpg"></p>
<p>Hot on the heels of Yahoo announcing a data breach of 500 million user accounts in September, the company announced in September that they suffered another breach of one billion accounts. </p>
<p>As Yahoo previously disclosed in November, law enforcement provided the company with data files that a third party claimed was Yahoo user data. The company analyzed this data with the assistance of outside forensic experts and found that it appears to be Yahoo user data. Based on further analysis of this data by the forensic experts, Yahoo believes an unauthorized third party, in August 2013, stole data associated with more than one billion user accounts. The company has not been able to identify the intrusion associated with this theft. Yahoo believes this incident is likely distinct from the incident the company disclosed on September 22, 2016.</p>
<p><a href="https://community.norton.com/en/blogs/security-covered-norton/over-1-million-google-accounts-breached-malicious-android-apps"><strong>Over 1 Million Google Accounts Breached via Malicious Android Apps</strong></a></p>
<p><img class="norton-image-center" src="/en/system/files/u7098741/RR%20GGL%20ARTICLE.png"></p>
<p>The attack campaign, dubbed Gooligan, has breached the security of over one million Google accounts and is still growing at a rate of 13,000 new infections each day. Gooligan is a variant of the Ghost Push malware family of hostile downloaders which download apps onto infected devices without the user’s permission. Once the malware has successfully been installed on the victim’s device, Gooligan can install apps from Google Play and rate them to raise their reputation and install adware to generate revenue. Gooligan can also steal a user’s Google email account and authentication token information, which can allow the attacker to bypass the login process and access the account as the victim is perceived as already logged in. These tokens can then be used to access data from Google Play, Gmail, Google Photos, Google Docs, G Suite, Google Drive, and more.</p>
<p>The devices affected are phones that are running Android 4 (Jelly Bean, KitKat) and 5 (Lollipop). </p>
<p>This malware is unique in nature, as the only way to completely remove it from your phone is to do a clean installation of the operating system. This means that you may have to go to your mobile carrier and have them perform the installation.</p>
<p><strong><a href="https://community.norton.com/en/blogs/security-covered-norton/over-400-million-accounts-breached-friendfinder-networks-inc">Over 400 Million Accounts Breached From FriendFinder Networks Inc.</a></strong></p>
<p><img class="norton-image-center" src="/en/system/files/u7098741/FriendFinder_400_Million.jpg"></p>
<p>FriendFinder Inc. owns multiple adult-themed websites, including AdultFriendFinder.com, Cams.com, Penthouse.com, Stripshow.com and more. In November 2016 the company went through a second breach in just over a year. This time 400 million accounts were breached and 16 million accounts were deleted.</p>
<p><strong><a href="https://community.norton.com/en/blogs/security-covered-norton/beautifulpeoplecom%E2%80%99s-ugly-data-breach">BeautifulPeople.Com’s Ugly Data Breach</a></strong></p>
<p>Since April 2016, 1.1 million people have been at risk of having their private data exposed in the underground economy. Controversial website BeautifulPeople.com, which claims to have “the largest network of attractive people in the world,” announced that they had become a recent victim of a data breach.</p>
<p>According to Australian security researcher Troy Hunt, who manages the popular <a href="https://haveibeenpwned.com/" rel="nofollow">HaveIBeenPwned</a> breach notification website, the data is not only genuine and online but is now being traded for money on the Dark Web.</p>
<h4><strong>What To Do to Stay Safe</strong></h4>
<p>If you think your account has been breached, change your password immediately! Even if you don’t think you’re affected, there’s no way of completely verifying that.</p>
<p>In addition to changing your passwords, it’s an excellent idea to turn on <a href="https://community.norton.com/en/blogs/norton-protection-blog/importance-two-factor-authentication">Two-Factor Authentication</a> (2FA). Two-Factor Authentication adds an extra layer of security to your account, usually by sending a text code to a device you own that the hacker does not have access to.</p>
<h4>What Can I Do To Protect My Information?</h4>
<p>Being proactive about your accounts is the best security measure that you can take to do your part to help prevent data breaches.</p>
<p>Make sure that you use strong, secure passwords for each account you access, and be sure not to use the same password across multiple sites. Keeping track of various passwords can seem like an insurmountable feat, but there are free utilities such as <a href="https://identitysafe.norton.com/" rel="nofollow">Norton’s ID Safe Password Manager</a> to help you keep track of all of those random strings of letters, numbers and characters.</p>
<h4>Keep a Watchful Eye on Your Information</h4>
<p>Monitor your bank and financial accounts on a regular basis for suspicious activity. If you do see suspicious activity, take action as soon as possible. Contact the bank or institution the suspicious activity originated from. Notify them of the suspicious transaction and inform them that your information was stolen in a data breach.</p>
<p>Make sure to subscribe to an identity protection service that not only monitors your personal information but also works with you 24 x 7 x 365 to fix your stolen identity should your identity ever get stolen. </p>
<p>Data breaches are here to stay, and the best defense against them is a good offense. Educate yourself and stay diligent about monitoring your online life.</p>
<p>Learn more about identity theft in this comprehensive<a href="http://now.symassets.com/content/dam/content/en-us/collaterals/ebook/idp-what-you-need-to-know.pdf" rel="nofollow"> guide</a>.</p>
<p><a href="http://now.symassets.com/content/dam/content/en-us/collaterals/ebook/idp-what-you-need-to-know.pdf" rel="nofollow"><img src="/en/system/files/u7098741/Screen%20Shot%202016-12-28%20at%208.56.40%20AM.png"></a></p>
<p>Source: <a href="http://www.idtheftcenter.org/images/breach/ITRCBreachReport2016.pdf" rel="nofollow">http://www.idtheftcenter.org/images/breach/ITRCBreachReport_2016.pdf</a></p>
Wed, 28 Dec 2016 17:05:14 +0000https://community.norton.com/de/node/1413211Online Christmas Shopping: Naughty or Nice?https://community.norton.com/de/node/1410161
<p><img class="norton-image-center" src="/en/system/files/u2038063/Online%20Shopping%20Survey-FB.png">Surprisingly, in this always-connected day and age, people surveyed by Norton in Australia and New Zealand said they plan to do less than 40% of their Christmas shopping online.</p>
<p>Norton released results of their Online Shopping Survey just in time for the holidays, when online retailers offer sales to lure shoppers into buying presents for themselves and others. However, the survey results may indicate those promotions are not enough to encourage security-concerned shoppers to buy online.</p>
<p>While concerns about online shopping risks are high, only 23 % of people in Australia and 20% of people in New Zealand who actually get stressed when worrying about the security issues of online shopping.</p>
<p><strong>The Highest Concerns About the Risks of Online Shopping</strong></p>
<p>On average, about one in three people spend more than two hours a week shopping online. 16% of people in Australia and 17% of people in New Zealand have already experienced credit card fraud after shopping online.</p>
<p>Participants were asked about what risks they worry most about when shopping online. The two highest concerns were having credit card details stolen, and purchasing goods from an illegitimate website. Surprisingly, people were less concerned about personal information being stolen, such as falling victim to a data breach, or getting their username and password details leaked from a website.</p>
<p><strong>Online Shopping Security </strong></p>
<p>Although people are aware that there is a need for security when shopping online, about half do not know or follow basic steps to secure their online shopping experiences.</p>
<p>When it comes to online shopping security, there are a multitude of security tools put in place to help keep users and their transactions safe. However, one in three shoppers don’t look for site security before shopping. Of the 63% who bother to check, only 17% are fully confident that they know what to look for.<br>
Around half of people surveyed make their purchases from websites with only enhanced security settings- the other half either do not use them or do not really understand enhanced security.</p>
<p><strong>Mobile Shopping</strong><br>
When it comes to making purchases on mobile phones, there is a clear generation gap. Around half of people in New Zealand under 45 use their smartphones to browse online shops, and of those, only 37% of them make purchases. In Australia, 53% of people under 30 use their phones for browsing, and 35% make actual purchases.</p>
<p><strong>Protection + Education:</strong></p>
<p>While a lot of these statistics may seem alarming, they don’t have to be. If you plan to do any online shopping this year, it’s important to know how to identify and use the security tools available to you. The best way to protect yourself and others from cybercriminals is to be proactive about the security features available and learn how they work. Here’s a rundown of some of the most important security tools available for shopping online, what to look for, and how to use them:</p>
<ul>
<li>Check for SSL, aka <a href="https://community.norton.com/en/blogs/norton-protection-blog/ssl-certificates-what-consumers-need-know">Secure Sockets Layer</a>, which is a secure shopping protocol. Sites with SSL feature ‘HTTPS://’ instead of ‘HTTP://’ in their web addresses. These certificates provide that safety padlock in the URL bar of a browser, along with the HTTPS (“S” indicating “secure”) in the address bar. </li>
<li>Use a comprehensive Internet security solution such as <a href="https://au.norton.com/norton-security-antivirus" rel="nofollow">Norton Security Premium </a>and ensure that it is always up to date.</li>
<li>When shopping on mobile devices, use a VPN when you browse. This encrypts your traffic so even if someone manages to eavesdrop, they’ll just have a bunch of encrypted data. VPNs, or virtual private networks, like <a href="http://us.norton.com/wi-fi-privacy" rel="nofollow">Norton WiFi Privacy</a> can turn Wi-Fi into secured private connections.</li>
<li>You can actually find out a lot about a website’s security by looking for visual cues. Scan the entire site for trust marks. <a href="http://www.symantec.com/page.jsp?id=seal-transition">Norton Secure Seal</a> is a widely recognised trust mark which provides evidence that a retailer’s identity has been verified and the website is secured by Symantec.</li>
<li>App concerns are high, however, with <a href="https://au.norton.com/norton-mobile-security" rel="nofollow">Norton Mobile Security</a>, you can use App Advisor for Android to help verify the legitimacy of an app.</li>
<li>Lastly, if you are still unsure about the credibility of a website you can use <a href="https://safeweb.norton.com/" rel="nofollow">Norton Safe Web</a>, a free online tool, that can help identify risky websites as you shop.</li>
</ul>
<p><strong>About the Norton Online Shopping Survey</strong></p>
<p>Norton by Symantec commissioned an online quantitative survey through Morar Consulting in November 2016, with 1,000 Australians aged 18 and over. The survey aimed to understand and discover the views and experiences related to the security of online shopping for Australians.</p>
Fri, 16 Dec 2016 17:57:12 +0000https://community.norton.com/de/node/1410161The 12 Days of Nortonhttps://community.norton.com/de/node/1401801
<p><img class="norton-image-center" src="/en/system/files/u7131691/12_day_0.jpg"><strong>Welcome to The 12 Days of Norton! </strong><br>
We believe that a secure holiday is a happy holiday, so</p>
<p><em>"We’re counting down days until Christmas is here,<br>
And gifting you cool security tips to be of good cheer,</em><br><em>And make sure this season is the best of your year."</em></p>
<p>We hope you'll join us every day until Christmas to learn some tips that will help keep your digital life secure so you can enjoy the joys of this holiday season.</p>
<p><em><strong>On the first day of Christmas, a friend shared with me: <br>
A social scam that nearly took all my money. </strong></em></p>
<p><img class="norton-image-right" src="/en/system/files/u7131691/01_day.jpg">Our social networks can multiply the cheer of the holiday season. What’s nicer than a platform that allows us to interact easily with faraway loved ones, often in real time? However, social networks can also have their naughty — and downright dangerous — side during the holidays. Follow these tips to stay safe from social networking scams: </p>
<p><em>Beware Video Links </em><br>
There’s a reason cat videos are so popular on social media — cats are cute! But watching cats playing with Christmas tree tinsel could, in fact, be risky. <strong>Tip:</strong> No video, no matter how cute, is worth giving up your personal information, even if all your friends are LOLing and sharing it. If you are required to provide your details in order to watch a video, just don’t. </p>
<p><em>Be Charitable, But Careful</em> <br>
Cybercriminals have learned how to turn our emotions against us. During the holidays, our desire to be extra kind and generous could make us vulnerable to fake charity scams that pop up in your social networks. If you receive an email or shared post soliciting monetary donations, don’t click on the links. <strong>Tip:</strong> Always verify the authenticity of the organization by checking on <a href="https://www.give.org" rel="nofollow">Give.org</a> or <a href="http://www.charitynavigator.org" rel="nofollow">Charitynavigator.org</a>. Then go directly to the organization’s website to make your donation.</p>
<p><strong><em>On the second day of Christmas, my love put on my PC:</em></strong><br><strong><em>A free software program that made it so totally wonky. </em></strong></p>
<p><img class="norton-image-left" src="/en/system/files/u7131691/02_day.jpg">When you’ve budgeted all your money for Christmas gifts, paying for antivirus may be at the bottom of your list, but the old adage that you get what you pay for can often apply to free software — especially if it isn’t backed by a well-known, reliable company. Read these tips to stay clear of bad freeware:</p>
<p><em>Pay the Price for Reputation</em><br>
Not all freeware is dangerous, but don’t take chances when it comes to protecting your devices and your identity. There’s always a price tag for freeware, and that fee can range from bothersome advertisements to constant alerts prompting you to upgrade to a paid version. <strong>Tip:</strong> Read the terms and conditions before you install that freeware. With less-proven security companies, downloading free software means <em>you</em> are the fee — because your personal information and data will be shared with third parties.</p>
<p><em>Don’t Fall for Fake Anti-virus Software</em><br>
One common — and ironic — method cybercriminals use to con victims is to disguise malware as free anti-virus software. Typically, the victims download a free “antivirus” solution. Then not long after, the bogus software alerts the victims that their computer is infected with a virus and prompts them to use a credit card to pay to have the nonexistent virus removed. The victims then unwittingly provide their credit card information to a cybercriminal, opening themselves up to identity theft. <strong>Tip:</strong> Protecting your device and identity are worth a price that costs way less than 5 golden rings. Opt for a proven and trusted anti-virus suite like <a href="http://us.norton.com/norton-security-antivirus" rel="nofollow">Norton Security</a>, which includes protection for up to five devices.</p>
<p><strong><em>On the third day of Christmas, my true love gave to me:</em></strong><br><strong><em>A gold ring he bought online, which turned out to be phony. </em></strong></p>
<p><img class="norton-image-right" src="/en/system/files/u7131691/03_day.jpg">Online shopping has made holiday shopping more convenient. No circling the mall for parking or standing in long lines for you! But online shopping comes with its own headaches if you’re not careful. Read these tips to shop safely online:</p>
<p><em>Follow the Signs of Security</em><br>
When shopping online the most important step is to make sure the website you’re shopping on has a URL that starts with “https”. The “s” stands for “security” and means your transactions on that site are encrypted and secure. <strong>Tip:</strong> Look for other visual indicators of security, such as a lock symbol, green color in the address bar, or the <a href="https://www.staysecureonline.com/norton-secured-seal" rel="nofollow">Norton Secured Seal</a>.</p>
<p><em>Shop Sites You Know and Trust</em><br>
The temptation to get a bargain may be strong, but sticking with reputable shopping websites you know and trust is key. Nobody wants to give their credit card information to a phony website and risk identity theft, or buy an important gift — like a ring — only to receive fake merchandise. <strong>Tip: </strong>Some shopping sites offer extra protection for their customers. Purchases from online stores with the <a href="https://www.nortonshoppingguarantee.com" rel="nofollow">Norton Shopping Guarantee</a> automatically come with a lowest-price guarantee.</p>
<p><strong><em>On the fourth day of Christmas, my true love sent to me:</em></strong><br><strong><em>An email saying I’d won a shopping spree! </em></strong></p>
<p><img class="norton-image-left" src="/en/system/files/u7131691/04_day.jpg">During what should be a joyous time of year, cybercriminals take advantage of people’s generosity and interest in shopping. Beware of spam and scams, and check out these tips:</p>
<p><em>Don’t Fall for Phishing Scams</em><br>
Phishing emails seem to come from people you know, but they’re really from scammers who have enough of your personal information to entice you to open their email. For example, you might get an email from your “boyfriend” telling you to click on a link to claim your free shopping spree prize. <strong>Tip:</strong> If it seems to good to be true, it probably is. Never click links or open attachments in suspicious emails.</p>
<p><em>Be Smart About Spyware</em><br>
Scammers can install spyware on your computer, giving them access to your personal information, which they’ll then use against you. If your computer is running slower or you start to see more popup ads than usual, you may have spyware. <strong>Tip:</strong> Be selective about what you download to your computer, and get anti-spyware protection from a strong security suite, such as <a href="http://us.norton.com/norton-security-antivirus" rel="nofollow">Norton Security</a>.</p>
<p><strong><em>On the fifth day of Christmas, my true love gave to me:</em></strong><br><strong><em>A smartphone that’s totally trendy. </em></strong></p>
<p><img class="norton-image-right" src="/en/system/files/u7131691/05_day.jpg">For many of us, our smartphones have become extensions of ourselves, and we can’t imagine living without them. Because these devices are so important to our daily lives and hold so much personal information, it’s crucial to protect them. Follow these tips to secure your smartphones:</p>
<p><em>Start with the Basics</em><br>
Smartphones are only as secure as we make them. According to the <a href="http://us.norton.com/cyber-security-insights" rel="nofollow">2015 Norton Cybersecurity Insights Report</a>, a shocking 31% of smartphone users around the world do not use a passcode for their phones. <strong>Tip:</strong> Be sure to lock your smartphone with a passcode or touch ID.</p>
<p><em>Add on Mobile Device Security</em><br>
When you think about all you do on a smartphone, it becomes clear that these devices are actually powerful mini computers. As such, they’re also vulnerable to some of the same viruses and malware as your PC or Mac. <strong>Tip:</strong> Install mobile device security software on your smartphone. Fortunately, there is an app for that, such as <a href="http://us.norton.com/norton-mobile-security" rel="nofollow">Norton Mobile Security</a>.</p>
<p><em>Think Before You Download</em><br>
Many smartphone apps are fun and functional, which is why people love them — whether for keeping track of holiday cookie recipes or playing games. However, you should only download apps from reputable app stores, such as Google Play and the Apple App Store. These have rigorous standards to keep malware-laden apps off of your smartphones. <strong>Tip:</strong> If you still want to download apps from third-party sites, consider that <a href="http://us.norton.com/norton-mobile-security" rel="nofollow">Norton Mobile Security</a> warns you of potentially dangerous ones before you download them.</p>
<p><strong><em>On the sixth day of Christmas, my PC gave to me:</em></strong><br><strong><em>Malware that almost drove me to insanity. </em></strong></p>
<p><img class="norton-image-left" src="/en/system/files/u7131691/06_day.jpg">Malware, short for malicious software, refers to cybersecurity risks such as viruses, adware, spyware, and Trojan horses — the equivalent of online coal in your stocking. These programs are specifically engineered to compromise a computer’s security features and give hackers access to your personal data. Read these tips to avoid malware:</p>
<p><em>Keep Your Software Up to Date</em><br>
Start by installing a computer security software suite from a reputable and trusted brand. Then be sure to keep that software up to date by always installing the latest patches and updates as soon as they’re available. <strong>Tip:</strong> Patches and updates are typically released to fix recently discovered vulnerabilities in software. Updating your software whenever prompted is the best way to stay secure.</p>
<p><em>Power Up Your Password</em><br>
Using a password or passcode to secure your devices is fundamental, but not everybody takes this basic step. Create passwords that are complex, using a combination of numbers, special characters, and upper and lowercase letters. <strong>Tip:</strong> If you struggle to remember all your passwords, try a password manager, such as <a href="https://identitysafe.norton.com" rel="nofollow">Norton Identity Safe</a>.</p>
<p><em>Think Before You Link</em><br>
Malware is most often distributed via spam emails containing links or attachments that, when clicked on or opened, install malware on your system. Stop to think before you decide to click on a link, even if the email appears to be sent by a reputable company or a good friend, because hackers can spoof email accounts. <strong>Tip:</strong> Always check links before clicking on them by hovering your cursor over the link. If you don’t recognize the destination URL, don’t click. If you’re uncertain, type the URL into <a href="https://safeweb.norton.com" rel="nofollow">Norton Safe Web</a>, which will warn you if the site is unsafe.</p>
<p><strong><em>On the seventh day of Christmas, my true love gave to me:</em></strong><br><strong><em>A smart watch that’s oh so sporty. </em></strong></p>
<p><img class="norton-image-right" src="/en/system/files/u7131691/07_day.jpg">In addition to tablets and smartphones, wearable devices are highly desired Christmas presents. Follow these tips to use yours safely or to gift along with your smart present:</p>
<p><em>Read the Fine Print</em><br>
Wearable fitness trackers are almost ubiquitous today, but these smart devices can sometimes know too much. Think about all the daily data they record: your location, your schedule, what you eat, where you like to run, and your vitals. Considering this, you may want to think about who you’re sharing this information with, like your fitness social network or — unknowingly — hackers and cyberstalkers. <strong>Tip:</strong> Know what data is being accessed by the app. Always read the app’s privacy policy before downloading it. Try <a href="http://us.norton.com/norton-mobile-security" rel="nofollow">Norton Mobile Security</a> to protect yourself from downloading malicious apps to your smartphone.</p>
<p><em>Secure Your Wearable and Yourself</em><br>
Although wearable devices access a lot of your personal data, these technologies lag far behind others when it comes to built-in security. Many apps for wearables transmit login credentials through clear text. If you use a fitness tracker, chances are most of your data is transmitted via Bluetooth LE or wireless Internet, and is <em>not</em> encrypted. Smart hackers could intercept data if they are within range. <strong>Tip:</strong> Turn off Bluetooth and Wi-Fi when you’re not actively sending data. A fun fake username, like Rudolph2016, plus a strong password will keep you safer from hackers and stalkers.</p>
<p><strong><em>On the eighth day of Christmas, my PC gave to me:</em></strong><br><strong><em>A locked screen demanding money. </em></strong></p>
<p><img class="norton-image-left" src="/en/system/files/u7131691/08_day.jpg">In the olden days, highway robbery was a real threat. Now, in the online days, Internet superhighway robbery in the form of ransomware is becoming all too common. Follow these tips to avoid having your computer held for ransom:</p>
<p><em>Start Secure and Stay Secure</em><br>
Computer security software, whether a <a href="http://us.norton.com/norton-security-for-one-device" rel="nofollow">basic anti-virus program</a> or a <a href="http://us.norton.com/norton-security-antivirus" rel="nofollow">full Internet security suite</a>, is your first line of defense to prevent falling victim to ransomware. These programs will alert you to viruses or other malware that could leave your system vulnerable to hackers. <strong>Tip:</strong> Choose solid security software from a trusted brand, like Norton by Symantec. Avoid free anti-virus, especially from companies you’ve never heard of.<br><br><em>Back It Up</em><br>
Hackers deploy ransomware to encrypt the data on your computer and prevent you from accessing your own information. Although dealing with ransomware can be scary, backing up your files will make the ordeal less so. If you have backup copies of all your important data, then you won’t have to worry about the files the cybercriminals encrypted. <strong>Tip: </strong>Back up your files regularly. Some computer security suites, such as <a href="http://us.norton.com/norton-security-with-backup" rel="nofollow">Norton Security Premium</a>, include backup.</p>
<p><em>Never Pay the Ransom</em><br>
If you find a ransom note on your computer screen demanding money in exchange for unlocking your computer, don’t panic. And never pay the ransom. Once paid, the cybercriminals rarely, if ever, decrypt your files. Paying them may even encourage them to try to extract more money from you. <strong>Tip:</strong> With backed-up files, you can tell the hackers to bah-humbug off and you won’t have to worry about paying ransom. Use tools like <a href="https://security.symantec.com/nbrt/npe.aspx" rel="nofollow">Norton Power Eraser</a> to rid yourself of the ransomware.</p>
<p><strong><em>On the ninth day of Christmas, my true love set up for me:</em></strong><br><strong><em>All of my fancy new IoT. </em></strong></p>
<p><img class="norton-image-right" src="/en/system/files/u7131691/09_day.jpg">Who doesn’t want a brand-new TV for Christmas? And a high-def smart TV playing a continuous loop of a burning Yule log may be even more desirable. But it’s not only smart TVs that are popular; smart homes themselves are trending with people who want convenience paired with wireless technologies. These tips can keep your new Internet of Things devices protected from cybercriminals:</p>
<p><em>Fortify Your Connected Home Network </em><br>
When it comes to IoT, your smart things are only as secure as your home’s Internet router — which is also the easiest point of entry for hackers. Be sure your home Wi-Fi network is using WPA2 encryption and change the default name and password on your router. <strong>Tip:</strong> Also make sure the main devices you use to control your smart home (think desktops and smartphones) are protected with strong passwords, two-factor authentication, or good security software, like <a href="http://us.norton.com/norton-security-with-backup" rel="nofollow">Norton Security Premium</a>, which protects up to 10 devices.</p>
<p><em>Control Your Data</em><br>
Every smart device collects data that it uses to make your life easier, but it’s up to you to decide what types of data are collected and how that data is used. Start by reading the privacy policy that comes with your devices or the apps that control them. Then choose the level of privacy you want for each device. <strong>Tip:</strong> Turn on privacy settings whenever possible to make sure your data isn’t shared with third-party partners. </p>
<p><strong><em>On the tenth day of Christmas, cybercriminals stole from me:</em></strong><br><strong><em>My personal information and my identity. </em></strong></p>
<p><img class="norton-image-left" src="/en/system/files/u7131691/10_day.jpg">Identity theft is a growing problem that consumers can only do so much to prevent. It’s important to know which preventive steps you can take, but also how to get your identity back if it is stolen. Read these tips to stay one step ahead of identity thief Grinches:</p>
<p><em>Protect Your Computer</em><br>
Identity theft is especially hard to prevent because you have to protect your identity both online and off. The access point for your digital information is most likely your computer, so make sure it’s secure. Tip: Install a full Internet security suite for optimum protection. Some suites, like <a href="http://us.norton.com/norton-security-antivirus" rel="nofollow">Norton Security</a>, offer protection for multiple devices, including smartphones and tablets, for a single subscription fee.</p>
<p><em>Secure Your Mailbox</em><br>
Would-be identity thieves often target unsecured mailboxes to access your information. The mail you receive — and send — is full of personally identifying information that thieves could use to access your existing accounts or to create new ones using your identity. <strong>Tip:</strong> Put a lock on your mailbox, or pay for a P.O. Box. That way you won’t have to worry about having your new credit cards or health insurance cards stolen and then used to compromise your identity and ruin your credit.</p>
<p><em>Call in the Professionals</em><br>
No matter how vigilant you may be about shredding all mail and documents containing your personal information, or how careful you are about securing your online life, you can’t control all of your data. It’s already out there — at your doctor’s office, your school, your favorite local store. And, depending on how secure their systems are, your information could end up being part of the growing number of data breaches. <strong>Tip:</strong> Many companies offer identity theft protection, with varying features. <a href="//localhost/norton.com/eliteid" rel="nofollow">Norton Identity Protection Elite</a> provides unlimited access to a U.S.-based team of experts who will work around the clock to monitor your identity. If they see something suspicious, they’ll send you an alert and address the issue immediately.</p>
<p><strong><em>On the eleventh day of Christmas, my true love gave to me:</em></strong><br><strong><em>A powerful and shiny new PC.</em></strong></p>
<p><img class="norton-image-right" src="/en/system/files/u7131691/11_day.jpg">Starting fresh with a new PC is on many people’s Christmas lists. Whether you’re receiving or giving, keep your digital gifts more secure this holiday season by following these basic tips:</p>
<p><em>Create a Strong Password</em><br>
Use passwords to keep your device secure when not in use — or in case it gets misplaced or stolen. Choose passwords that are complex, using a combination of numbers, special characters, and upper and lowercase letters. <strong>Tip: </strong>Create a password by using a favorite song (or Christmas carol) for inspiration, but swapping some numbers or special characters for letters. Like, T12dOxMa$.</p>
<p><em>Choose Reputable Security Software</em><br>
Always install Internet security software from a trusted company to protect your new PC or Mac. <strong>Tip:</strong> Check out <a href="http://us.norton.com/norton-security-antivirus" rel="nofollow">Norton Security</a> to keep that new laptop safe.</p>
<p><em>Update All of Your Software</em><br>
Whether your laptop or other device is old or new, always updating to the latest software can keep it protected. <strong>Tip:</strong> Most software updates or patches are released to fix vulnerabilities found in a previous version, so installing the latest version will always offer maximum protection. </p>
<p><img class="norton-image-left" src="/en/system/files/u7131691/12_day.jpg"><strong><em>On the twelfth day of Christmas, Norton gave to me:<br>
A new sense of security. </em></strong></p>
<p>Wishing you a secure and happy holiday season!</p>
<p>~ Norton by Symantec</p>
Tue, 13 Dec 2016 07:00:00 +0000https://community.norton.com/de/node/1401801How To Set Up and Secure Your New Techhttps://community.norton.com/de/node/1406591
<p>Congratulations on your new device! You’re likely caught up in the fun of having a new gadget, and probably shopping for a shiny (or sparkly) new case. While a case protects your device from nature and clumsy hands, it doesn’t make your phone absolutely safe. Why? Because it doesn’t protect what matters most—your information.</p>
<p><img class="norton-image-left" src="/en/system/files/u2038063/hero.jpg">Think about all that you do on your devices—sharing precious photos, ordering your favorite latte, and shopping. With the rise of cybercrime and the high costs associated with it, it’s even more important that you learn how to protect what matters most—the personal information inside your device.</p>
<p>The <a href="https://www.symantec.com/content/dam/symantec/docs/reports/2016-norton-cyber-security-insights-report.pdf">2016 Norton Cyber Security Insights Report</a> revealed that 689 million people in 21 countries experienced cybercrime within the last year alone. Cybercrime victims spent $125 billion globally dealing with the consequences of hacking, phishing, identity theft and online crime. One cannot put a value on the time a victim spends recovering their information.</p>
<p>From laptops to smart watches, to connecting safely online, we have created the ultimate guide on how to protect your new tech.</p>
<h3><strong>How to Securely Set Up a New Computer:</strong></h3>
<h4>
<img class="norton-image-right" src="/en/system/files/u2038063/Comp.png">​1. <strong>Install Security Software</strong>
</h4>
<p>The moment you connect to the Internet, your computer becomes vulnerable. While a brand-new computer out of the box may seem secure, it is not. Sometimes a brand-new computer may sit in a stock room for months before finding its new home. One of the very first things you should do with your new computer is install an Internet security software suite, such as <a href="http://us.norton.com/norton-security-antivirus" rel="nofollow">Norton Security</a>. An up-to-date Internet security program will defend your computer against viruses, spyware, malware and other online threats.</p>
<h4>2. <strong>Software Updates</strong>
</h4>
<p>As we mentioned above, sometimes a computer can sit around for a while before being sold. During that time, there’s a good chance that the software installed on the computer has been updated by the manufacturer to help protect against known <a href="https://community.norton.com/en/blogs/norton-protection-blog/importance-general-software-updates-and-patches">software vulnerabilities</a>. However, that new computer has never been turned on until it arrives in your hands, and has not had the chance to be updated.<br>
Once you have installed your Internet security software, run all operating system updates. This will protect your computer against the latest, known threats on the Internet landscape.</p>
<h4>3. <strong>Remove Unnecessary Software</strong>
</h4>
<p>A lot of new computers will come bundled with other software, or “add-ons.” Each program on your computer is essentially a weakness, because it can contain software vulnerabilities. The more programs on your computer, the more vulnerable it is. Go through your applications on your computer and delete the ones you know you won’t use.</p>
<h4><strong>4. Put a Password on It</strong></h4>
<p>Like the key to your house, the password is the key to your digital life. Secure password use is essential for all physical devices, as it is the first defense against unauthorized access. While you may think your computer is safe at home, things do happen, and in the event that your computer or laptop gets lost or stolen, no one can get into it.</p>
<p>Many people make the mistake of <a href="https://community.norton.com/en/blogs/norton-protection-blog/how-choose-secure-password">using passwords that are too simple</a>. Yes, your pet’s name is a nice password, however it’s also much easier to crack than a term mixed with numbers and symbols in addition to random letters. In today’s fast-paced, high-tech world, there’s no such thing as a password that’s too complicated. </p>
<h4><strong>5. Create a Back-Up Plan</strong></h4>
<p>Once you’ve tightened up the Internet security of your new computer, create a plan to safeguard your digital data. There are many ways available to back up your data, both physically and in the cloud. We actually recommend both, as you can never be too safe. <a href="https://us.norton.com/norton-security-with-backup" rel="nofollow">Norton Security Premium</a> not only offers Internet security, it also offers 25 GB of secure cloud storage for your PC backup needs.</p>
<p>In addition to backing up to the cloud, it is always a good idea to have a physical copy of your data. External hard drives are extremely affordable these days. When shopping for an external hard drive, make a note of the capacity of your drive and be sure that the external drive you choose is larger than your computer’s internal drive. After you have selected your drive, create a backup regimen. Most computer operating systems come with a built-in utility for backup. You can schedule it for weekly or monthly backups. Once you’ve completed your backup, remember to unplug your hard drive from your computer to keep it safe from online threats.</p>
<h4><strong>6. Transferring Data</strong></h4>
<p>If you backed up your data successfully before you wiped your old hard drive, putting your files back onto a new computer will be a snap. Just plug in your USB or external hard drive and drag your old files onto your new computer.</p>
<h3><strong>How to Securely Set Up a Mobile Phone or Tablet:</strong></h3>
<p><img class="norton-image-left" src="/en/system/files/u2038063/tablet.png"><strong>1. Back Up Your Old Device First</strong><br>
Chances are, when you get your new phone or tablet, you’ll want to transfer all your old data over to the new device. In order to do so, you’ll need a copy of your old data first. This can be a bit tricky when it comes to mobile devices, as sometimes people will sometimes get a different device than they previously owned. If you are getting a completely different device than what you had previously, your best bet is to go to the carrier’s website and look up how to transfer data from an old phone to a new phone.</p>
<h4><strong>2. Update The Operating System</strong></h4>
<p>As with computers, new phones and tablets can sit around a while before being purchased. Once you’ve powered up and connected your device, check for operating system updates and install them immediately.</p>
<h4><strong>3. Device Passcodes</strong></h4>
<p>Phone and tablet passcodes are another important topic. Opening your device with a single swipe may be convenient, but it also means the device is vulnerable to anyone who picks it up. Use a passcode on your phone, and make certain it auto-locks. That extra bit of security can go a long way.</p>
<h4><strong>4. Use Internet Security Software</strong></h4>
<p>As with computers, the mobile threat landscape is just as active. There are a multitude of mobile threats out there such as <a href="https://community.norton.com/en/blogs/norton-protection-blog/mobile-scams-how-identify-them-and-protect-yourself">mobile scams</a>, <a href="https://community.norton.com/en/blogs/norton-protection-blog/telltale-signs-app-violating-your-privacy">fake apps</a>, <a href="https://community.norton.com/en/blogs/norton-protection-blog/types-common-mobile-threats-and-what-they-can-do-your-phone">mobile malware</a> and more. Install a reputable anti-malware app from a trusted and secure source such as <a href="https://play.google.com/store/apps/details?id=com.symantec.mobilesecurity&amp;hl=en" rel="nofollow">Norton Mobile Security</a>. Every time you download a new app, you should run a scan to verify that the download was successful and did not contain any malicious codes. Malware has been particularly popular on Android devices.</p>
<h4><strong>5. Beware of Third-Party App Stores</strong></h4>
<p>Always verify apps before you install them on your phone. There are <a href="https://community.norton.com/en/blogs/norton-protection-blog/risks-third-party-app-stores">third-party applications</a> available outside of official app stores. While many of these applications are harmless, others may contain malicious code. It is not recommended to visit these stores, and to only visit the official app store. You can also use Norton App Advisor, which is included with Norton Mobile Security. <a href="https://mobilesecurity.norton.com" rel="nofollow">Norton App Advisor</a> scans apps before you download them from the Google Play store to prevent installation of apps with malware. In addition to malware protection the App Advisor will also alert you about apps known to share personal information, consume lots of data, drain your battery or bombard you with ads.</p>
<h4><strong>6. Disable Bluetooth Connectivity</strong></h4>
<p>Disable Bluetooth connectivity when you’re out in public. Bluetooth allows your phone to connect wirelessly with other smart electronics—and enables other people to connect to your device without your permission if it’s left on and unattended. Attackers could be anywhere, from the local coffee shop you frequent, to the coin laundry spot you use around the corner. Leaving your Bluetooth on puts you and your personal information at a huge disadvantage.</p>
<h4><strong>7. Durable Cases</strong></h4>
<p>Most devices can withstand getting dropped in a rain puddle, pool, or toilet, but not for long. If you’re concerned about your device being subjected to the elements, consider investing in a waterproof case. If you tend to have a case of the “drops” then you may want to invest in a shockproof case.<br>
</p>
<h3>​<strong>Securing the Internet of Things:</strong>
</h3>
<h4>
<img class="norton-image-right" src="/en/system/files/u2038063/IoT2.jpg">Protect Your “Things”</h4>
<p>One thing about IoT devices that is often overlooked is that they are ALL computers, connected to the Internet. These computers, even though some are as small as a coin, are still vulnerable to malware, just like standard computers, tablets, and phones. Do some research on your device to see if it has a default password. If it does, the manufacturer’s website should have instructions on how to change it. Make sure the password you create is complicated, unique, and hard to guess. Be sure to not share passwords with other devices as well. It may seem like an easy “hack” to remember them; however, if a hacker gets a hold of one password, they can try that password on other things.</p>
<h3><strong>How to Connect to the Internet Securely:</strong></h3>
<h4>
<img class="norton-image-left" src="/en/system/files/u2038063/wifi.png"><strong>Safe Wi-Fi Use in Your Home</strong>
</h4>
<p>The home router is a sort of front door to your home for the Internet. Naturally, you want this device to be as secure as possible. With the multiple device usage and the Internet of Things, there is a large spectrum of other devices in your home that access the router and connect to the Internet. A small vulnerability in a home Wi-Fi network can give a cybercriminal access to almost all the devices that access the router’s network. Some of the things to factor into <a href="https://community.norton.com/en/blogs/norton-protection-blog/keep-your-home-wi-fi-safe-7-simple-steps%C2%A0">securing your router</a> are to change the default name and password on your router and its network, enable network encryption, and even <a href="https://community.norton.com/en/blogs/norton-protection-blog/get-know-firewalls-101-30sectech">set up a firewall</a>.</p>
<h4> </h4>
<h4><strong>Safe Wi-Fi Use On the Go: </strong></h4>
<p>We use our devices constantly, whether out and about, or at on home on our couch. As a result, we should use caution when using our devices on unsecured public Wi-Fi. There are <a href="https://community.norton.com/en/blogs/norton-protection-blog/risks-public-wi-fi">many risks</a> that come with connecting to these networks such as risk of man in the middle attacks, Wi-Fi snooping, malware distribution and more. Since we carry these devices back and forth from our homes, it is essential that we keep the devices secure while on the go, so we don’t put our home networks at risk. </p>
<p>Keep these tips and suggestions in mind as you embark on the New Year and know your devices are safe from threats, whether in hacker or element form. Stay up to date on the latest security innovations so you can feel good about the safety of your device. The best way to get ahead of the bad guys is to participate in your own Internet security. Educate yourself about the threats out there and how they can affect you. Use security software, research your devices and secure them, and tell your friends to do the same! When more of us stay protected together, attackers will have fewer targets to take advantage of.</p>
<p><a href="https://now.symassets.com/content/dam/norton/campaign/new-device-security/how-to-protect-your-new-device.pdf" rel="nofollow"><img src="/en/system/files/u2038063/Screen%20Shot%202017-01-06%20at%208.33.30%20AM%20copy_0.png"></a></p>
Mon, 05 Dec 2016 21:13:55 +0000https://community.norton.com/de/node/1406591Happy Thanksgiving! Celebrating the Things That Keep us Safehttps://community.norton.com/de/node/1394011
<p><img class="norton-image-center" src="/en/system/files/u2038063/2.png"></p>
<p><strong>Save</strong><strong>Save</strong></p>
Wed, 23 Nov 2016 22:15:37 +0000https://community.norton.com/de/node/139401112 Days of Norton Tipshttps://community.norton.com/de/node/1396291
<p><img class="norton-image-center" src="/en/system/files/u7131691/intro%20fin_0.jpg"><strong><em>On the first day of Christmas, my good friend shared with me:<br>
A social network scam that almost took my money.</em></strong></p>
<p>Our social networks can multiply the cheer of the holiday season. What’s nicer than a platform that allows us to interact easily with faraway loved ones, often in real time? However, social networks can also have their naughty — and downright dangerous — side during the holidays. Follow these tips to stay safe from social networking scams: </p>
<p><img class="norton-image-right" src="/en/system/files/u7131691/01_day.jpg"><strong>Beware Video Links</strong><br>
There’s a reason cat videos are so popular on social media — cats are cute! But watching cats playing with Christmas tree tinsel could, in fact, be risky. <strong>Tip:</strong> No video, no matter how cute, is worth giving up your personal information, even if all your friends are LOLing and sharing it. If you are required to provide your details in order to watch a video, just don’t. </p>
<p><strong>Be Charitable, But Careful</strong><br>
Cybercriminals have learned how to turn our emotions against us. During the holidays, our desire to be extra kind and generous could make us vulnerable to fake charity scams that pop up in your social networks. If you receive an email or shared post soliciting monetary donations, don’t click on the links. <strong>Tip:</strong> Always verify the authenticity of the organization by checking on Give.org or Charitynavigator.org. Then go directly to the organization’s website to make your donation.</p>
<p><strong><em>On the second day of Christmas, my true love installed on my old PC:</em></strong><br><strong><em>A free software program that made it so wonky.</em></strong></p>
<p>When you’ve budgeted all your money for Christmas gifts, paying for antivirus may be at the bottom of your list, but the old adage that you get what you pay for can often apply to free software — especially if it isn’t backed by a well-known, reliable company. Read these tips to stay clear of bad freeware:</p>
<p><img class="norton-image-left" src="/en/system/files/u7131691/02_day.jpg"><strong>Pay the Price for Reputation</strong><br>
Not all freeware is dangerous, but don’t take chances when it comes to protecting your devices and your identity. There’s always a price tag for freeware, and that fee can range from bothersome advertisements to constant alerts prompting you to upgrade to a paid version. <strong>Tip:</strong> Read the terms and conditions before you install that freeware. With less-proven security companies, downloading free software means <em>you</em> are the fee — because your personal information and data will be shared with third parties.</p>
<p><strong>Don’t Fall for Fake Anti-virus Software</strong><br>
One common — and ironic — method cybercriminals use to con victims is to disguise malware as free anti-virus software. Typically, the victims download a free “antivirus” solution. Then not long after, the bogus software alerts the victims that their computer is infected with a virus and prompts them to use a credit card to pay to have the nonexistent virus removed. The victims then unwittingly provide their credit card information to a cybercriminal, opening themselves up to identity theft. <strong>Tip:</strong> Protecting your device and identity are worth a price that costs way less than 5 golden rings. Opt for a proven and trusted anti-virus suite like <a href="http://us.norton.com/norton-security-antivirus" rel="nofollow">Norton Security</a>, which includes protection for up to five devices.</p>
<p><strong><em>On the third day of Christmas, my true love gave to me:</em></strong><br><strong><em>A gold ring he bought online, which turned out to be a phony.</em></strong></p>
<p>Online shopping has made holiday shopping more convenient. No circling the mall for parking or standing in long lines for you! But online shopping comes with its own headaches if you’re not careful. Read these tips to shop safely online:</p>
<p><img class="norton-image-right" src="/en/system/files/u7131691/03_day.jpg"><strong>Follow the Signs of Security</strong><br>
When shopping online the most important step is to make sure the website you’re shopping on has a URL that starts with “https”. The “s” stands for “security” and means your transactions on that site are encrypted and secure. <strong>Tip:</strong> Look for other visual indicators of security, such as a lock symbol, green color in the address bar, or the <a href="https://www.staysecureonline.com/norton-secured-seal" rel="nofollow">Norton Secured Seal</a>.</p>
<p><strong>Shop Sites You Know and Trust</strong><br>
The temptation to get a bargain may be strong, but sticking with reputable shopping websites you know and trust is key. Nobody wants to give their credit card information to a phony website and risk identity theft, or buy an important gift — like a ring — only to receive fake merchandise. <strong>Tip: </strong>Some shopping sites offer extra protection for their customers. Purchases from online stores with the <a href="https://www.nortonshoppingguarantee.com" rel="nofollow">Norton Shopping Guarantee</a> automatically come with a lowest-price guarantee.</p>
<p><strong><em>On the fourth day of Christmas, my true love sent to me:</em></strong><br><strong><em>An email saying I’d won a shopping spree! </em></strong></p>
<p>During what should be a joyous time of year, cybercriminals take advantage of people’s generosity and interest in shopping. Beware of spam and scams, and check out these tips:</p>
<p><img class="norton-image-left" src="/en/system/files/u7131691/04_day.jpg"><strong>Don’t Fall for Phishing Scams</strong><br>
Phishing emails seem to come from people you know, but they’re really from scammers who have enough of your personal information to entice you to open their email. For example, you might get an email from your “boyfriend” telling you to click on a link to claim your free shopping spree prize. <strong>Tip:</strong> If it seems to good to be true, it probably is. Never click links or open attachments in suspicious emails.</p>
<p><strong>Be Smart About Spyware</strong><br>
Scammers can install spyware on your computer, giving them access to your personal information, which they’ll then use against you. If your computer is running slower or you start to see more popup ads than usual, you may have spyware. <strong>Tip:</strong> Be selective about what you download to your computer, and get anti-spyware protection from a strong security suite, such as <a href="http://us.norton.com/norton-security-antivirus" rel="nofollow">Norton Security</a>.</p>
<p><strong><em>On the fifth day of Christmas, my true love gave to me:</em></strong><br><strong><em>A smartphone that’s totally trendy.</em></strong></p>
<p>For many of us, our smartphones have become extensions of ourselves, and we can’t imagine living without them. Because these devices are so important to our daily lives and hold so much personal information, it’s crucial to protect them. Follow these tips to secure your smartphones:</p>
<p><img class="norton-image-right" src="/en/system/files/u7131691/05_day.jpg"><strong>Start with the Basics</strong><br>
Smartphones are only as secure as we make them. According to the <a href="http://us.norton.com/cyber-security-insights" rel="nofollow">2015 Norton Cybersecurity Insights Report</a>, a shocking 31% of smartphone users around the world do not use a passcode for their phones. <strong>Tip:</strong> Be sure to lock your smartphone with a passcode or touch ID.</p>
<p><strong>Add on Mobile Device Security</strong><br>
When you think about all you do on a smartphone, it becomes clear that these devices are actually powerful mini computers. As such, they’re also vulnerable to some of the same viruses and malware as your PC or Mac. <strong>Tip:</strong> Install mobile device security software on your smartphone. Fortunately, there is an app for that, such as <a href="http://us.norton.com/norton-mobile-security" rel="nofollow">Norton Mobile Security</a>.</p>
<p><strong>Think Before You Download</strong><br>
Many smartphone apps are fun and functional, which is why people love them — whether for keeping track of holiday cookie recipes or playing games. However, you should only download apps from reputable app stores, such as Google Play and the Apple App Store. These have rigorous standards to keep malware-laden apps off of your smartphones. <strong>Tip:</strong> If you still want to download apps from third-party sites, consider that <a href="http://us.norton.com/norton-mobile-security" rel="nofollow">Norton Mobile Security</a> warns you of potentially dangerous ones before you download them.</p>
<p><strong><em>On the sixth day of Christmas, my PC gave to me:</em></strong><br><strong><em>Malware that almost drove me to insanity.</em></strong></p>
<p>Malware, short for malicious software, refers to cybersecurity risks such as viruses, adware, spyware, and Trojan horses — the equivalent of online coal in your stocking. These programs are specifically engineered to compromise a computer’s security features and give hackers access to your personal data. Read these tips to avoid malware:</p>
<p><img class="norton-image-left" src="/en/system/files/u7131691/06_day.jpg"><strong>Keep Your Software Up to Date</strong><br>
Start by installing a computer security software suite from a reputable and trusted brand. Then be sure to keep that software up to date by always installing the latest patches and updates as soon as they’re available. <strong>Tip:</strong> Patches and updates are typically released to fix recently discovered vulnerabilities in software. Updating your software whenever prompted is the best way to stay secure.</p>
<p><strong>Power Up Your Password</strong><br>
Using a password or passcode to secure your devices is fundamental, but not everybody takes this basic step. Create passwords that are complex, using a combination of numbers, special characters, and upper and lowercase letters. <strong>Tip:</strong> If you struggle to remember all your passwords, try a password manager, such as <a href="https://identitysafe.norton.com" rel="nofollow">Norton Identity Safe</a>.</p>
<p><strong>Think Before You Link</strong><br>
Malware is most often distributed via spam emails containing links or attachments that, when clicked on or opened, install malware on your system. Stop to think before you decide to click on a link, even if the email appears to be sent by a reputable company or a good friend, because hackers can spoof email accounts. <strong>Tip:</strong> Always check links before clicking on them by hovering your cursor over the link. If you don’t recognize the destination URL, don’t click. If you’re uncertain, type the URL into <a href="https://safeweb.norton.com" rel="nofollow">Norton Safe Web</a>, which will warn you if the site is unsafe.</p>
<p><strong><em>On the seventh day of Christmas, my true love gave to me:</em></strong><br><strong><em>A smart watch that’s oh so sporty. </em></strong></p>
<p>In addition to tablets and smartphones, wearable devices are highly desired Christmas presents. Follow these tips to use yours safely or to gift along with your smart present:</p>
<p><img class="norton-image-right" src="/en/system/files/u7131691/07_day.jpg"><strong>Read the Fine Print</strong><br>
Wearable fitness trackers are almost ubiquitous today, but these smart devices can sometimes know too much. Think about all the daily data they record: your location, your schedule, what you eat, where you like to run, and your vitals. Considering this, you may want to think about who you’re sharing this information with, like your fitness social network or — unknowingly — hackers and cyberstalkers. <strong>Tip:</strong> Know what data is being accessed by the app. Always read the app’s privacy policy before downloading it. Try <a href="http://us.norton.com/norton-mobile-security" rel="nofollow">Norton Mobile Security</a> to protect yourself from downloading malicious apps to your smartphone.</p>
<p><strong>Secure Your Wearable and Yourself</strong><br>
Although wearable devices access a lot of your personal data, these technologies lag far behind others when it comes to built-in security. Many apps for wearables transmit login credentials through clear text. If you use a fitness tracker, chances are most of your data is transmitted via Bluetooth LE or wireless Internet, and is <em>not</em> encrypted. Smart hackers could intercept data if they are within range. <strong>Tip:</strong> Turn off Bluetooth and Wi-Fi when you’re not actively sending data. A fun fake username, like Rudolph2016, plus a strong password will keep you safer from hackers and stalkers.</p>
<p><strong><em>On the eighth day of Christmas, my PC gave to me:</em></strong><br><strong><em>A locked screen demanding money. </em></strong></p>
<p>In the olden days, highway robbery was a real threat. Now, in the online days, Internet superhighway robbery in the form of ransomware is becoming all too common. Follow these tips to avoid having your computer held for ransom:</p>
<p><img class="norton-image-left" src="/en/system/files/u7131691/08_day.jpg"><strong>Start Secure and Stay Secure</strong><br>
Computer security software, whether a <a href="http://us.norton.com/norton-security-for-one-device" rel="nofollow">basic anti-virus program</a> or a <a href="http://us.norton.com/norton-security-antivirus" rel="nofollow">full Internet security suite</a>, is your first line of defense to prevent falling victim to ransomware. These programs will alert you to viruses or other malware that could leave your system vulnerable to hackers. <strong>Tip:</strong> Choose solid security software from a trusted brand, like Norton by Symantec. Avoid free anti-virus, especially from companies you’ve never heard of.</p>
<p><strong>Back It Up</strong><br>
Hackers deploy ransomware to encrypt the data on your computer and prevent you from accessing your own information. Although dealing with ransomware can be scary, backing up your files will make the ordeal less so. If you have backup copies of all your important data, then you won’t have to worry about the files the cybercriminals encrypted. <strong>Tip: </strong>Back up your files regularly. Some computer security suites, such as <a href="http://us.norton.com/norton-security-with-backup" rel="nofollow">Norton Security Premium</a>, include backup.</p>
<p><strong>Never Pay the Ransom</strong><br>
If you find a ransom note on your computer screen demanding money in exchange for unlocking your computer, don’t panic. And never pay the ransom. Once paid, the cybercriminals rarely, if ever, decrypt your files. Paying them may even encourage them to try to extract more money from you. <strong>Tip:</strong> With backed-up files, you can tell the hackers to bah-humbug off and you won’t have to worry about paying ransom. Use tools like <a href="https://security.symantec.com/nbrt/npe.aspx" rel="nofollow">Norton Power Eraser</a> to rid yourself of the ransomware.</p>
<p><strong><em>On the ninth day of Christmas, my true love set up for me:</em></strong><br><strong><em>All of my fancy new IoT. </em></strong></p>
<p>Who doesn’t want a brand-new TV for Christmas? And a high-def smart TV playing a continuous loop of a burning Yule log may be even more desirable. But it’s not only smart TVs that are popular; smart homes themselves are trending with people who want convenience paired with wireless technologies. These tips can keep your new Internet of Things devices protected from cybercriminals:</p>
<p><img class="norton-image-right" src="/en/system/files/u7131691/09_day.jpg"><strong>Fortify Your Connected Home Network </strong><br>
When it comes to IoT, your smart things are only as secure as your home’s Internet router — which is also the easiest point of entry for hackers. Be sure your home Wi-Fi network is using WPA2 encryption and change the default name and password on your router. <strong>Tip:</strong> Also make sure the main devices you use to control your smart home (think desktops and smartphones) are protected with strong passwords, two-factor authentication, or good security software, like <a href="http://us.norton.com/norton-security-with-backup" rel="nofollow">Norton Security Premium</a>, which protects up to 10 devices.</p>
<p><strong>Control Your Data</strong><br>
Every smart device collects data that it uses to make your life easier, but it’s up to you to decide what types of data are collected and how that data is used. Start by reading the privacy policy that comes with your devices or the apps that control them. Then choose the level of privacy you want for each device. <strong>Tip:</strong> Turn on privacy settings whenever possible to make sure your data isn’t shared with third-party partners. </p>
<p><strong><em>On the tenth day of Christmas, cybercriminals stole from me:</em></strong><br><strong><em>My personal information and my identity. </em></strong></p>
<p>Identity theft is a growing problem that consumers can only do so much to prevent. It’s important to know which preventive steps you can take, but also how to get your identity back if it is stolen. Read these tips to stay one step ahead of identity thief Grinches:</p>
<p><img class="norton-image-left" src="/en/system/files/u7131691/10_day.jpg"><strong>Protect Your Computer</strong><br>
Identity theft is especially hard to prevent because you have to protect your identity both online and off. The access point for your digital information is most likely your computer, so make sure it’s secure. <strong>Tip:</strong> Install a full Internet security suite for optimum protection. Some suites, like <a href="http://us.norton.com/norton-security-antivirus" rel="nofollow">Norton Security</a>, offer protection for multiple devices, including smartphones and tablets, for a single subscription fee.</p>
<p><strong>Secure Your Mailbox</strong><br>
Would-be identity thieves often target unsecured mailboxes to access your information. The mail you receive — and send — is full of personally identifying information that thieves could use to access your existing accounts or to create new ones using your identity. <strong>Tip:</strong> Put a lock on your mailbox, or pay for a P.O. Box. That way you won’t have to worry about having your new credit cards or health insurance cards stolen and then used to compromise your identity and ruin your credit.</p>
<p><strong>Call in the Professionals</strong><br>
No matter how vigilant you may be about shredding all mail and documents containing your personal information, or how careful you are about securing your online life, you can’t control all of your data. It’s already out there — at your doctor’s office, your school, your favorite local store. And, depending on how secure their systems are, your information could end up being part of the growing number of data breaches. <strong>Tip:</strong> Many companies offer identity theft protection, with varying features. <a href="https://us.norton.com/identity-theft-protection-elite" rel="nofollow">Norton Identity Protection Elite</a> provides unlimited access to a U.S.-based team of experts who will work around the clock to monitor your identity. If they see something suspicious, they’ll send you an alert and address the issue immediately.</p>
<p><strong><em>On the eleventh day of Christmas, my true love gave to me:</em></strong><br><strong><em>A powerful and shiny new PC.</em></strong></p>
<p>Starting fresh with a new PC is on many people’s Christmas lists. Whether you’re receiving or giving, keep your digital gifts more secure this holiday season by following these basic tips:</p>
<p><img class="norton-image-right" src="/en/system/files/u7131691/11_day.jpg"><strong>Create a Strong Password</strong><br>
Use passwords to keep your device secure when not in use — or in case it gets misplaced or stolen. Choose passwords that are complex, using a combination of numbers, special characters, and upper and lowercase letters. <strong>Tip: </strong>Create a password by using a favorite song (or Christmas carol) for inspiration, but swapping some numbers or special characters for letters. Like, T12dOxMa$.</p>
<p><strong>Choose Reputable Security Software</strong><br>
Always install Internet security software from a trusted company to protect your new PC or Mac. <strong>Tip:</strong> Check out <a href="http://us.norton.com/norton-security-antivirus" rel="nofollow">Norton Security</a> to keep that new laptop safe.</p>
<p><strong>Update All of Your Software</strong><br>
Whether your laptop or other device is old or new, always updating to the latest software can keep it protected. <strong>Tip:</strong> Most software updates or patches are released to fix vulnerabilities found in a previous version, so installing the latest version will always offer maximum protection.</p>
<p><strong><em>On the twelfth day of Christmas, Norton gave to me:</em></strong><br><strong><em>A new sense of security. </em></strong></p>
<p><img class="norton-image-left" src="/en/system/files/u7131691/12_day.jpg">Why wait 12 days to enjoy the holidays with the new sense of security that Norton can give you? Norton products offer complete protection for your digital life, devices, and connections. That means <a href="http://us.norton.com/norton-security-antivirus" rel="nofollow">Norton Security</a> software secures your PCs, Macs, smartphones, and tablets — new or old. In addition, Norton keeps your personal information private on public Wi-Fi and protects your identity with ID theft protection.</p>
<p>Explore our selection of <a href="http://us.norton.com/products" rel="nofollow">products</a> that protect your digital life, and enjoy online peace of mind this holiday season with Norton.</p>
<p>Wishing you a secure and happy holiday season!</p>
<p>~ Norton by Symantec</p>
Mon, 21 Nov 2016 20:23:35 +0000https://community.norton.com/de/node/1396291Holiday Travelers' Tips for Device Security in Airportshttps://community.norton.com/de/node/1396471
<p><img class="norton-image-center" src="/en/system/files/u7131691/holiday2016-travel-banner-us.png">As the most popular travel days of the year approach, many holiday travelers are creating mental checklists for navigating busy airports — most likely with their trusty mobile devices in hand and laptops in their bags. To save fliers the headache and heartbreak of having their devices compromised en route to Grandma’s house, here’s a checklist to keep smartphones, tablets, and laptops safe while spending time in an airport.</p>
<p><strong>Get Smart Before You Leave Home</strong><br>
When you check in online the day before your flight, take some time to check off a few more pre-travel to-dos.</p>
<p><em>Checklist:</em></p>
<ul>
<li>Make sure you lock all your devices, whether cellphones, tablets, PCs, or Macs. Either use a touch ID or create strong passwords. Use a combination of at least eight numbers, letters, and special characters.</li>
<li>Update all of your operating systems and apps to the latest versions to protect your devices from any known vulnerabilities.</li>
<li>Print out as many travel documents at home as possible, such as boarding passes and baggage tags. The fewer automated kiosks you use at the airport, the better, because those touchscreen kiosks are hackable.</li>
<li>Protect your smartphones and laptops with security software, such as <a href="http://us.norton.com/norton-security-antivirus" rel="nofollow">Norton Security</a>.</li>
<li>Turn off Wi-Fi and Bluetooth auto-connect features in your device’s settings to prevent automatically connecting to either as you traverse the airport. Turn off file sharing, too.</li>
<li>Download a VPN app, like <a href="http://us.norton.com/wifi-privacy" rel="nofollow">Norton WiFi Privacy</a>, to protect your information if you decide to use public Wi-Fi at the airport.</li>
</ul>
<p><strong>BYOC: Bring Your Own Charger</strong><br>
Recent risks to mobile devices at airports involve the always-popular charging stations. And when your flight is delayed and your device’s battery is low, the prospect of not being able to use your smartphone or tablet may make using a free charging station very tempting. But here are two reasons you shouldn’t.</p>
<p>Juice jacking can happen when you use a USB port at a charging station that’s been tampered with by hackers out to get your personal information. That’s because USB ports are also used to transfer data onto or off of your phone. If you happen to fall victim to a compromised charging station, a hacker could access all of your sensitive personal information: emails, photographs, and more. Bring your own power cord to be safe.</p>
<p>Or, if you forget yours and need to use a USB cable to charge, power off your phone before plugging it into the USB cable to reduce the risk of data being accessed or malware being uploaded. This is not a fail-proof workaround, however, as some devices automatically turn back on when charging.</p>
<p>Video jacking is a newer version of juice jacking that requires a hacker to outfit a charging station with an HDMI splitter and recorder. The scam works in a similar way: While your device is plugged into the USB charging station, the hacker can both view and record whatever you do on your smartphone. Worst-case scenarios could be the hacker being able to see personally identifying information that could give them access to your financial and email accounts.</p>
<p><em>Checklist:</em></p>
<ul>
<li>Carry a power cord or a portable battery charger.</li>
<li>Avoid USB-based charging stations.</li>
<li>Power off and lock your device if you must use a charging station.</li>
<li>If you plan to use your device while it’s charging, avoid accessing or entering any sensitive information.</li>
</ul>
<p><strong>Be Wary of Public Wi-Fi</strong><br>
Once your device is fully powered, you may be tempted to use free public Wi-Fi instead of your data plan. Don’t. Public Wi-Fi may be convenient but it’s rarely secure. In heavily trafficked public spaces like airports, hackers have a large number of targets they can lure into connecting to bogus hotspots with names that sound legitimate. Once you’re connected to a unsecured Wi-Fi hotspot, any information that travels over the connection could be snooped on by a hacker.</p>
<p><em>Checklist:</em></p>
<ul>
<li>If you must use public Wi-Fi, choose an option that is at least password-protected.</li>
<li>Use a VPN app to encrypt all of the information leaving and entering your mobile device. With the <a href="http://us.norton.com/wifi-privacy" rel="nofollow">Norton WiFi Privacy</a> app, all of your private information stays private no matter how unsecure the Wi-Fi connection may be.</li>
</ul>
<p>As you navigate airports during this busiest of travel seasons, be sure to use this simple checklist for your devices so you can enjoy some peace of mind.</p>
<p><img src="/en/system/files/u7131691/holiday2016-travel-infographic-us.png"></p>
Mon, 21 Nov 2016 17:42:08 +0000https://community.norton.com/de/node/1396471Happy Halloween From Norton by Symantec!https://community.norton.com/de/node/1394001
<p><img src="/en/system/files/u2038063/Halloween_global.gif"></p>
Mon, 31 Oct 2016 13:00:50 +0000https://community.norton.com/de/node/1394001How To Recognize and Protect Yourself from Cybercrimehttps://community.norton.com/de/node/1391761
<p>Cybercrime is a growing threat in 2016. You might think that the only form of cybercrime you have to worry about is hackers stealing your financial information. Unfortunately there are far more concerns than just basic financial ones. When you see the full list of cybercrimes out there, you might be tempted to stop using the Internet entirely. However, such drastic measures are not necessary. All you need to do to protect yourself is take some basic precautions and know who to contact when you see others engaged in criminal activities online.</p>
<h4>
<img class="norton-image-right" src="/en/system/files/u2038063/NSCAM%20ARTICLE%20IMAGE_0.png">​<strong>What Is Cybercrime?</strong>
</h4>
<p>Cybercrime is any crime that takes place online or primarily online. That can run the gamut from the aforementioned identity theft and other security breaches to things like “revenge porn,” cyber-stalking, harassment, bullying and even child sexual exploitation. Terrorists are collaborating more on the Internet, moving that most terrifying of crimes into cyberspace.<br>
</p>
<h4><strong>How to Protect Yourself from Cybercrime</strong></h4>
<p>There are some basic precautions everyone using the Internet should take to protect themselves from the gamut of cybercrimes out there:</p>
<p>1. Use a full-service Internet security suite such as <a href="http://us.norton.com/products" rel="nofollow">Norton Security Premium</a> to ensure that you are protecting yourself against viruses, as well as other emerging threats on the Internet.</p>
<p>2. Use <a href="https://community.norton.com/en/blogs/norton-protection-blog/how-choose-secure-password">strong passwords</a>, don’t repeat your passwords on different sites and make sure to change your passwords regularly. A <a href="https://community.norton.com/en/blogs/norton-protection-blog/password-managers-are-key-secure-passwords">password management application</a> can help you to keep your passwords locked down.</p>
<p>3. Keep all your <a href="https://community.norton.com/en/blogs/norton-protection-blog/importance-general-software-updates-and-patches">software update</a>d. This is most important with your operating systems and Internet security suites. Hackers are most likely to use known exploits in your software to gain access to your system. Patching those exploits makes it far less likely that you’re going to be a victim.</p>
<p>4. Manage your <a href="https://community.norton.com/en/blogs/norton-protection-blog/how-keep-your-personal-information-safe-social-media">social media settings</a> to keep most of your personal and private information locked down. Social engineering cybercriminals can often get your personal information with just a few data points, so the less you share with the broader world, the better.</p>
<p>5 .<a href="https://community.norton.com/en/blogs/norton-protection-blog/keep-your-home-wi-fi-safe-7-simple-steps%C2%A0">Secure your home network</a> with a strong encryption password as well as a VPN. A VPN will encrypt all traffic leaving your devices until it arrives at its destination. Even if a hacker manages to get in your communication line, they won’t intercept anything but encrypted traffic.</p>
<p>6. Talk to your children about acceptable use of the Internet without shutting down communication channels. Make sure they know that they can come to you in the event that they’re experiencing any kind of online harassment, bullying or stalking.</p>
<p>7. Keep up to date on major security breaches. If you have an account on a site that’s been impacted by a security breach, find out what the hackers know and change your password immediately.</p>
<p>8. If you believe that you’ve become a victim of a cybercrime, you need to alert the local police and in some cases the FBI and the Federal Trade Commission. Even if the crime seems minor this is important, as you are helping to prevent criminals from taking advantage of other people in the future.</p>
<p>Every American has an obligation to do their part in the fight against cybercrime. For most people, that just means following a few simple, common-sense steps to keep you and your family safe, as well as reporting cybercrimes to the relevant officials at the appropriate time. When you do that, you’re pulling your weight in the war on cybercrime.</p>
Mon, 17 Oct 2016 16:50:27 +0000https://community.norton.com/de/node/1391761Safe Online Shopping Tips for The Holiday Seasonhttps://community.norton.com/de/node/1391161
<p>The holidays are just around the corner, and that means many of us will be making purchases online to avoid large crowds and busy mall traffic. While online shopping has made our lives easier, it also exposes new weaknesses with the information we use to make those very purchases.</p>
<p>The holiday season is a lucrative time for online retailers and cybercriminals see this as an opportunity to profit as well. In fact, <a href="https://community.norton.com/blogs/norton-protection-blog/top-10-riskiest-websites">Norton Safe Web found that shopping sites are amongst the top ten most frequently exploited websites</a>. An additional concern is bogus e-commerce websites, which are made to look legit but are only built to steal your credit card information.</p>
<p>If you plan to do any online shopping this year, it’s important to know how to identify a secure online vendor. The best way to protect yourself and others from cyber criminals is to be proactive about the security features available and get to how they work.</p>
<p><br><img class="norton-image-center" src="/en/system/files/u2038063/Safe%20Shopping%20copy.png">​</p>
<p><strong>Why Protect Yourself?</strong></p>
<p>Whether you know it or not, you’ve already benefited from security features developed to protect personal data like passwords, usernames, and credit card numbers. Websites designed by financial institutions, insurance companies, and government agencies like the DMV all contain sophisticated security features to help keep your private information safe from <a href="https://community.norton.com/en/blogs/norton-protection-blog/what-cyber-espionage">cyber espionage</a>. </p>
<p>Most of us never even think about checking the online security status of a preferred online vendor—and that’s because nowadays most of us take online security for granted. However, cyber attackers are more sophisticated today than ever before. In 2014, <a href="http://know.symantec.com/LP=1123?CID=70150000000digEAAQ&amp;MC=189178&amp;OC=80555&amp;OT=WC&amp;WCN=212&amp;TT=SM" rel="nofollow">online scams</a> shared by friends on social media increased by 70 percent.</p>
<p>Online threats are not limited to large corporations—anyone can be a victim. For this reason, it’s important to know what to look for to ensure a safe online shopping experience.</p>
<p><strong>Online Shopping Security Features Customers Should Seek</strong></p>
<p>Unless you know what to look for, you won’t be able to identify the security features of online vendors. In particular, you should be looking for an <a href="https://community.norton.com/en/blogs/norton-protection-blog/ssl-certificates-what-consumers-need-know">SSL Certification</a>, which you can verify that in a few ways:</p>
<p>Look for the addition of an ‘S’ to the ‘http://’ at the beginning of a vendor’s URL. Look for visual cues indicating security, such as a lock symbol and green color in the address bar. Look for the addition of an ‘S’ to the ‘http://’ at the beginning of a vendor’s URL. Before entering a credit card payment or any confidential information make sure that the website in your browser address bar turns green or begins with HTTPS and not HTTP. This is an indicator that your session is secure and that the site is using encryption to protect your personal data. This protocol is known as SSL—Secure Socket Layer—encryption and it protects online transactions by keeping data in transit confidential through encryption. In other words, your information is not visible to hackers.</p>
<p><strong>Other Ways To Stay Secure:</strong></p>
<p>While you’re shopping on a website, some of these security features may not be present. Here are some other tips on how to stay protected while spreading the holiday cheer:</p>
<ul>
<li>Don't click on unexpected emails or links to "deals" that seem to good to be true. During the holiday season a phishing attempt may come in the form of an email advertising a great deal, but the links within the email will direct you to a bogus website that was built to capture victim’s personal information. Have your guard up for emails and text messages advertising holiday deals that seem to good to be true – most likely they are. Although spam can seem harmless, avoid clicking on links and downloading files from unknown sources. Phishing emails and websites often contain typos and spelling and grammatical mistakes.<br>
</li>
<li>Use the latest, <a href="https://community.norton.com/en/blogs/norton-protection-blog/importance-general-software-updates-and-patches">updated version of your Internet browser</a> to avoid security holes, which are other ways malware can be snuck in.<br>
</li>
<li>Use a VPN when you browse. This encrypts your traffic so even if someone manages to eavesdrop, they’ll just have a bunch of encrypted data. VPNs, or virtual private networks, like <a href="http://us.norton.com/wi-fi-privacy" rel="nofollow">Norton WiFi Privacy</a> can turn Wi-Fi into secured private connections.<br>
</li>
<li>Check to ensure your purchases and transactions are taking place on a secure site. You can actually find out a lot about a website’s security by looking for visual cues. Scan the entire site for trust marks. <a href="http://www.symantec.com/page.jsp?id=seal-transition">Norton Secure Seal</a> is a widely recognized trust mark which provides evidence that a retailer’s identity has been verified and the website is secured by Symantec.<br>
</li>
<li>Shopping guarantees are another important trust mark. The <a href="http://nortonshoppingguarantee.symantec.com/" rel="nofollow">Norton Shopping Guarantee</a> assures shoppers that they are safe from identity theft, in addition to purchase and the lowest price guarantees.<br>
</li>
<li>Use a comprehensive Internet security solution such as <a href="http://us.norton.com/norton-security-with-backup" rel="nofollow">Norton Security</a> and ensure that it is always up to date.<br>
</li>
<li>Beware of identity theft. You may not know it right away if a criminal has gotten a hold of your financial information. You can be proactive by closely monitoring all of your financial accounts, and signing up for text or email alerts if the institution offers them. Norton can make it easy to have proactive protection in place with <a href="https://us.norton.com/identity-theft-protection-elite?inid=hho_securitycovered_idp" rel="nofollow">Norton Identity Protection Elite</a>. Norton helps monitor everything online about you- from financial accounts, Social Media, and your credit report. Norton Identity Protection can even provide restoration services if you become a victim of identity theft.<br>
</li>
<li>
<a href="http://community.norton.com/blogs/norton-protection-blog/how-choose-secure-password">Always use strong passwords, update them regularly</a>, and never reuse the same password on for multiple accounts. This is especially important for accounts that contain your personal information. <a href="https://identitysafe.norton.com/" rel="nofollow">Norton Identity Safe</a> is a tool you can use to manage your passwords for free.<br>
</li>
<li>Lastly, if you are still unsure about the credibility of a website you can use <a href="https://safeweb.norton.com/" rel="nofollow">Norton Safe Web</a>, a free online tool, that can help identify risky websites as you shop.</li>
</ul>
<p>Shopping online is easy and convenient, provided that you’re vigilant about online security. If you don’t see any of the above security features on a vendor’s website, it would be wise to look elsewhere for the product or service you desire. Checking with organizations like the Better Business Bureau (BBB) can also help weed out poorly managed online shopping sites.</p>
<p><strong>Save</strong><strong>Save</strong></p>
Sat, 15 Oct 2016 00:00:00 +0000https://community.norton.com/de/node/1391161From the Break Room to the Boardroom: Creating a Culture of Cybersecurity in the Workplacehttps://community.norton.com/de/node/1389881
<p><img class="norton-image-center" src="/en/system/files/u2038063/NSCAM%20Week%202.png">Whether you own a small business or a big one, you live in a world where cybersecurity is of paramount importance. Big business, small business, academic institutions, government agencies, nonprofits… all of these need to take an interest in cybersecurity or pay the price. It’s a matter or success, but also a matter of national security. Those working in critical infrastructure have a special obligation to make sure that they’re securing the workplace. Here are some of the best ways to create a culture of cybersecurity where you work.</p>
<h4><strong>It All Starts With Education and Training</strong></h4>
<p>Cybersecurity around your office begins with education and training: education in best practices and training in how best to execute those best practices, as well as making them a daily habit. Some key areas to hit include:</p>
<ol>
<li>
<strong>App Updating: </strong>The main way that hackers are going to find a way into your system is through outdated app with known exploits. Make sure your coworkers and employees know to update their apps as soon as the update is available, not “later on.”</li>
<li>
<strong>Password Control: </strong>The best solution is a password management application. This holds all of your passwords in one, allowing people to generate strong, random passwords. They then only need to remember one strong password to unlock the app itself. Barring that, use strong passwords, only use them once and <em>never</em> store them on a post-it note on the monitor.</li>
<li>
<strong>VPNs: </strong>Especially for a business, VPNs aren’t optional. These encrypt all traffic leaving your computer until it reaches its destination. If someone somehow manages to get in the middle of your traffic, all they will have is encrypted junk data. It’s not enough to have a VPN -- people have to make sure they’re actually using them.</li>
<li>
<strong>Cybersecurity as Part of Basic Training: </strong>Educate all current employees at once and all new employees coming in with the same best practices. As best practices become updated, update your training and corral the team to make sure everyone continues to be on the same page.</li>
</ol>
<p>These four best practices, when combined with an enterprise-class, full-service Internet security suite are your best option when it comes to protecting your workplace against cyberthreats.</p>
<p><strong>Awareness Must Continue Past Education</strong></p>
<p>None of this education and training is any good unless you create a culture of cybersecurity awareness around the office. So how do you do that?</p>
<ol>
<li>
<strong>Compliance Programs: </strong>Make changing passwords a regular task, like cleaning the bathrooms. Make sure everyone is doing what they need to do to keep their passwords secure.</li>
<li>
<strong>Rewards Programs: </strong>Offer rewards for employees who find ways to improve cybersecurity around the office. Don’t look to spot check your cybersecurity. Look for ways to make small, but significant tweaks to what you’re already doing.</li>
<li>
<strong>Accountability Programs: </strong>Encouraging your employees to rat one another out for not following best practices will just erode trust. However, encouraging your employees to gently hold one another accountable will ensure compliance with best practices.</li>
</ol>
Mon, 10 Oct 2016 18:18:44 +0000https://community.norton.com/de/node/1389881Online Harassment: Halting a Disturbing 'New Normal'https://community.norton.com/de/node/1389831
<p>A new survey uncovers the prevalence of harassment against men in the online world and suggests ways to combat it.</p>
<p><img src="/en/system/files/u2038063/OnlineHarassmentAustralia_Men%202016_MEDIA_FINAL%5B1%5D.png">​</p>
<p>On the face of it, Gold Coast Titans National Rugby League (NRL) player Jarryd Hayne hardly seems a likely candidate for cyberbullying.</p>
<p>The former Parramatta Eels, San Francisco 49ers and Fiji rugby sevens superstar holds an elite place in Australian rugby league history, having been awarded the Dally M Medal twice as the NRL's player of the year. He has represented Australia and Fiji and in 2009 was also named the Rugby League International Federation’s International Player of the Year.</p>
<p>Yet as a high-profile athlete, Hayne has suffered his share of online backlash. “As an athlete in the public eye, you almost come to expect that you’ll become a target for negativity on social media,” he says. “But it’s obviously very sad when you see this becoming a wider problem in society, with young adults and kids being bullied over the internet. Statistics show just how devastating the effect can be.”</p>
<p>Hayne is using his star status to do something about the problem, teaming up with Norton as a brandambassador to raise awareness about cyberbullying. But what his experiences do underscore is just how widespread online harassment is now becoming. As new research from Norton reveals, the harassment of men online is a growing problem in Australia and New Zealand, with men under the age of 30 particularly vulnerable.</p>
<p>More than three quarters (78 per cent) of male Australian respondents to Norton’s survey who are under 30 said they’d experienced some form of abuse or harassment online – most commonly via social media, email or text messaging. While online harassment affects more young men, more than half (54 per cent) of male respondents had been targeted.</p>
<p>It’s a similar story in New Zealand, where 58 per cent of respondents said they’d experienced online harassment. Here too, men under 30 were a particular target, with 72 per cent saying they’d suffered online abuse.</p>
<p>Harassment ranged from gossip, trolling and privacy breaches to cyberbullying and threats of violence (including sexual violence) or death.</p>
<h3><img src="/en/system/files/u2038063/Symantec_Norton-NZ-Infographic_FINAL%5B2%5D_0.png"></h3>
<h3>Identifying the risk factors</h3>
<p>Earlier this year, Norton released its <a href="https://www.symantec.com/en/au/about/newsroom/press-releases/2016/symantec_0309_01">Online Harassment: The Australian Woman’s Experience</a> survey results. A comparison of the results shows that while men’s overall online experiences are not that dissimilar to women’s, there are striking differences when it comes to online harassment.</p>
<p>Unlike female victims, male victims are much less likely to be attacked for their physical appearance, or indeed their gender, than they are for such things as their sexual orientation or faith. In both Australia and New Zealand, one in four gay, bisexual and transgender men who had suffered serious harassment online said their sexual orientation had been the target.</p>
<p>Conversely, three times as many men (six per cent) in Australia are more likely to be attacked online because of their affiliation to a sports team, compared with only two percent of Australian women.</p>
<p>At the same time, 31 per cent of men from religious minority groups in Australia said they’d been attacked because of their faith. That’s higher than in New Zealand, where the figure is 21 per cent.</p>
<p>In addition, 57 percent of Australian women under 30 are more likely to experience cyberbullying compared to 37 percent of Australian males under 30.</p>
<p>The survey findings also indicate that men are more reluctant than women to speak up about their negative online experiences and address the emotional impact. In Australia, men (53 per cent) are less likely than women (70 per cent) to identify online harassment as a serious problem. Similarly, in New Zealand, only 56 per cent of men said they’d be reluctant to identify their harassment as a serious problem. </p>
<p>In Australia, 10 per cent of men indicated they felt powerless to do anything, 10 per cent reported the activity to the police, and only 7 per cent sought legal advice.</p>
<p>Yet at the same time, Norton’s findings expose the uncomfortable truth that online harassment takes an emotional toll. Anger is a common response – one in three men in both New Zealand and Australia reported feeling this way. In Australia, 22 per cent of the victims of cyberbullying also reported depression as a result of their experiences.</p>
<h3>Boosting online protection</h3>
<p>In general, Australian and New Zealand men felt that authorities needed to take online harassment more seriously and that more laws are needed to deal with all forms of online harassment.</p>
<p>In Australia, privacy settings on social media accounts are widely used (68 per cent), but about a third (32 per cent) of men are still unaware of them, don’t know how to use them or haven’t found the time to use them. In New Zealand, the figure is almost one in four (24 per cent).</p>
<p>Nearly half of men had been approached by someone online with a false identity yet a surprisingly large number (25 per cent of men in Australia and 35 per cent in New Zealand) accepted friend requests from strangers.</p>
<h3>Three steps to tackling online harassment</h3>
<p>At Norton, we’re really excited to be teaming up with Jarryd Hayne to raise awareness about cyberbullying and educate people about online crime.</p>
<p>“Awareness can play an enormous role in reducing online harassment and preventing it from becoming an established norm in our digital society,” he says. “I hope my involvement in Norton’s cause will encourage anyone experiencing cyberbullying to seek help.”<br><br>
Hayne points out that all too often people think that whatever happens in the online world is not as hurtful as the physical world. “That’s simply not true,” he says. “Cyberbullying can have a long-lasting impact, particularly on teenagers and young adults, and it can be a risk factor for depression, anxiety and youth suicide. It’s important we look out for each other, both in the physical and online world, and try to tackle cyberbullying to help improve and potentially save lives.”</p>
<p>We’ve also identified the three steps you should be taking now to help combat online harassment:</p>
<ul>
<li>
<strong>REVIEW</strong> your online presence on all devices
<ul>
<li>Check your security and privacy settings</li>
<li>Regularly change passwords.</li>
</ul>
</li>
<li>
<strong>RECOGNISE </strong>the problem if it happens and move quickly.
<ul>
<li>Do not respond to the perpetrator.</li>
<li>Keep all records and evidence of the harassment by making a copy of the message, photo or video.</li>
<li>If you are witness to online harassment, help by supporting the target and, depending on the situation, letting the perpetrators know that their behaviour is not acceptable.</li>
</ul>
</li>
<li>
<strong>REPORT</strong>
<ul>
<li>If someone says or does something that is inappropriate or deemed as harassment, report it to the relevant authorities immediately.</li>
<li>If inappropriate content is displayed online, contact the website operators by phone or email, requesting the content be removed or blocked.</li>
<li>If the emotional impact of online harassment takes its toll on your wellbeing, please reach out for help to organisations such as Norton’s long-term partner in Australia, <a href="https://www.beyondblue.org.au/" rel="nofollow">beyondblue</a><em>, which has a round-the-clock s</em>upport service available on 1300 22 4636. In New Zealand, contact <a href="http://www.lifeline.org.nz/corp_Home_378_2001.aspx" rel="nofollow">Lifeline</a> for assistance.</li>
</ul>
</li>
</ul>
<h3>About The Norton Online Harassment Report</h3>
<p>Norton by Symantec commissioned an online quantitative survey through Morar Consulting in February 2016, with 1,026 men in Australia and 505 men in New Zealand aged 18 and over. The survey aimed to understand men’s exposure to online harassment and the impact of these experiences.<br>
</p>
<h3>About Symantec</h3>
<p>Symantec Corporation (NASDAQ: SYMC), the world’s leading cyber security company, helps businesses, governments and people secure their most important data wherever it lives. Organizations across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints, cloud and infrastructure. Likewise, a global community of more than 50 million people and families rely on Symantec’s Norton suite of products for protection at home and across all of their devices. Symantec operates one of the world’s largest civilian cyber intelligence networks, allowing it to see and protect against the most advanced threats. For additional information, please visit <a href="http://www.symantec.com/">www.symantec.com</a> or connect with us on Facebook, Twitter, and LinkedIn.</p>
Mon, 10 Oct 2016 14:34:05 +0000https://community.norton.com/de/node/1389831The Basic Steps to Online Safety and Security- NCSAM Week 1https://community.norton.com/de/node/1388111
<p><img class="norton-image-center" src="/en/system/files/u2038063/NSCAM%20Week%201.png">Since our physical world has become so integrated with our technology, it’s not as easy as to protect it back when all we had to worry about was our computers and laptops. However, in this day and age, that is not the case. The threat landscape has evolved just as our technology has. The more devices that are out there equal more things for cybercriminals to attack.</p>
<p>Personal cybersecurity is a now a multi-pronged approach. It’s not as simple as installing antivirus on a computer anymore. A good foundation to personal cybersecurity is knowledge. Since threats don’t come solely in digital forms anymore, it’s a good idea to educate yourself about all of the threats out there.</p>
<p><br><strong>Social Engineering</strong><br>
Social engineering is a way that cybercriminals can use a false sense of trust, urgency, or even scare tactics in order to trick you into divulging sensitive information. Social engineering is based on trying to elicit emotional reactions, in order to get you to act before thinking.</p>
<p>For a more in-depth look at this topic, you can check out:<br><a href="https://community.norton.com/en/blogs/norton-protection-blog/what-social-engineering">What is Social Engineering?</a></p>
<p><strong>Phishing</strong><br>
Phishing emails are a good example of how social engineering can take place online. These emails can appear to come from a legitimate company, or possibly even someone you know. The objective of these emails is to seem like a familiar or known source, therefore relying on a person’s instinct to trust them. The more familiar a sender seems, the more likely someone is likely to turn over seemingly harmless personal information. Phishers have been known to use real company logos, and will also use a fake email address that looks very similar to the company’s actual address.</p>
<p>For more information about phishing and how to protect yourself:<br><a href="https://community.norton.com/en/blogs/norton-protection-blog/how-protect-yourself-phishing-scams">How To Protect Yourself From Phishing Scams</a><br><a href="https://community.norton.com/en/blogs/security-covered-norton/cold-calling-scammer-personal-experience">A Cold Calling Scammer - a Personal Experience</a><br><br><strong>Malware</strong><br>
Often interchanged with the word virus; they are essentially the same things. A virus is actually a type of malware. There are many different types of malware that do many different types of things. There are also different ways you can get malware on your device- yep, it’s not just on computers anymore.<br>
If you want a more comprehensive guide about malware you can start here:<br><a href="https://community.norton.com/en/blogs/norton-protection-blog/malware-101-what-malware">Malware 101: What Is Malware?</a></p>
<p>Once you’ve started with your cybersecurity educational foundation, next you can learn about how you can take precautions to secure your devices.</p>
<p><strong>Passwords</strong><br>
Passwords are the key to your entire digital life. One of the most important steps you can take is to ensure your digital security is to use strong, and secure passwords for each website you use.<br>
It’s extremely important not to reuse the same password across multiple websites- by doing so, you’re essentially creating a digital master key.</p>
<p>If a service offers it, you should set up Two-Factor Authentication (2FA) whenever possible. This method adds another layer of security to any account you may be logging into. What makes this more secure is the fact that it is something that you have to provide in addition the usual username and password information. The third “thing” is usually one of the following:</p>
<ul>
<li>Something you know – a pin number, password or pattern.</li>
<li>Something you have – an ATM or credit card, mobile phone or security token such as a key fob or USB token.</li>
<li>Something you are – Biometric authentication such as a voiceprint or fingerprint.</li>
</ul>
<p>To take a deeper dive into password and online account security, you can read these articles:<br><a href="https://community.norton.com/en/blogs/norton-protection-blog/how-choose-secure-password">How To Choose a Secure Password</a><br><a href="https://community.norton.com/en/blogs/norton-protection-blog/password-managers-are-key-secure-passwords">Password Managers Are The Key To Secure Passwords</a><br><a href="https://community.norton.com/en/blogs/norton-protection-blog/importance-two-factor-authentication">The Importance of Two-Factor Authentication</a></p>
<p><strong>Software Updates</strong><br>
To most, these may seem like an annoyance, however they are vital to you device’s cyber “health.” Not all software is created perfectly, so vulnerabilities in the software do pop up from time to time. Attackers use these vulnerabilities as a way to infect your computer with malware. This is where software updates come in. These updates push out what is called a “patch,” which is just as it sounds, a fix for the vulnerability, and one more way to ensure malware isn’t snuck onto your device.</p>
<p>To learn more about software updates, you can read:<br><a href="https://community.norton.com/en/blogs/norton-protection-blog/importance-general-software-updates-and-patches">The Importance of General Software Updates and Patches</a><br>
</p>
<p><strong>Data Back-up</strong><br>
In the event that something happens and you do contract malware, or even if you have a physical accident with your device, backing up your data will save your (digital) life. Physical devices are always replicable, however, digital data is irreplaceable. Always back up your device on a regular basis, and be sure to unplug your backup device when not in use.</p>
<p>For more tips on how to back up your devices read:<br><a href="https://community.norton.com/en/blogs/norton-protection-blog/importance-data-back">The Importance of Data Back-Up</a></p>
<p><strong>Internet Security Software</strong><br>
Last, but not least by a long shot- always use a good Internet security software suite on your device. Coupled with a personal education about the cybersecurity landscape, a good Internet Security program such as <a href="http://us.norton.com/" rel="nofollow">Norton Security</a>, will catch what you miss and help block the hidden threats lurking on the Internet. </p>
Tue, 04 Oct 2016 06:32:29 +0000https://community.norton.com/de/node/1388111Can the Elections Get Hacked? https://community.norton.com/de/node/1387171
<p><img src="/en/system/files/u1694783/can-elections-get-hacked-fb.png"></p>
<p><span>The security of electronic voting machines has been the subject of scrutiny, just before the </span><span>November U.S. presidential elections. Are they secure? Are they anonymous? And if the answer </span><span>is yes, how can we possibly know? A Symantec security expert recently demonstrated just what </span><span>a motivated hacker can do to undermine the election by hacking an electronic voting machine. </span><span> </span></p>
<p><strong>Can Hackers Hack the Election?</strong></p>
<p><span>At the Black Hat convention this year, Symantec’s Brian Varner </span><a href="http://money.cnn.com/2016/08/09/technology/voting-machine-hack-election/" rel="nofollow"><span>demonstrated a security flaw in an electronic voting machine</span></a><span> and the smart card a voter would </span><span>use to place their vote. Using a small device to exploit this flaw a hacker could potentially cast </span><span>multiple votes, tampering with the system. </span><span> </span><span>This is concerning when five states (Georgia, Delaware, Louisiana, South Carolina and New </span><span>Jersey) use electronic voting machines without a paper ballot verification system to audit the </span><span>results, according to a CNN report. </span><span> </span></p>
<p><strong><span>Other Cybersecurity Concerns </span></strong></p>
<p><span>Another cybersecurity concerns calls into question the security of election databases and </span><span>voters’ data. Officials recently confirmed that the state election databases of Arizona and </span><span>Illinois had been hacked and investigations into the security breach are under way, according to </span><span>several </span><a href="http://www.cbsnews.com/news/u-s-officials-investigating-hacking-into-more-state-election-systems/" rel="nofollow"><span>news reports</span><span>. </span></a></p>
<p><span>Other cybercriminals are capitalizing on interest in the U.S. elections to promote malicious </span><span>spam. A click bait story involving presidential candidate Hillary </span><span>Clinton is being used in a spam email campaign to spread malware. Satnam Narang, Norton </span><span>security expert, wrote </span><a href="http://www.symantec.com/connect/blogs/non-existent-video-involving-hillary-clinton-and-isis-leader-used-bait-malicious-spam"><span>in a blog post detailing this malicious spam campaign</span></a><span> that people should </span><span>proceed with caution when receiving any sort of sensationalized content referencing the </span><span>November elections campaign. “With less than 90 days to go until Election Day, we advise </span><span>everyone to keep an eye out for suspicious emails that may use either presidential candidate, </span><span>Hillary Clinton or Donald Trump, as bait. When seeking news related to the US elections only </span><span>visit trusted news websites and avoid opening unsolicited emails.” </span></p>
<p>As this story continues to develop, stay tuned to the Norton Protection Blog for cybersecurity news and research.</p>
Fri, 30 Sep 2016 12:00:00 +0000https://community.norton.com/de/node/1387171How a VPN Can Help Hide Your Search Historyhttps://community.norton.com/de/node/1386741
<p><img src="/en/system/files/u7131691/NWP_Ph2_LaptopPhoneWatch.jpg">Most of us use search engines on a daily basis. It’s become automatic. If we don’t know what something is, or hear a word that we can’t define, we go online and type the term into our favorite search engine. And voila, we have our answer in seconds. </p>
<p>But did you ever stop to wonder what happens to your searches? Sure, you can clear your <a href="https://community.norton.com/en/blogs/norton-protection-blog/what-are-cookies">cookies</a> and search history from your browser, but chances are that information has already been recorded somewhere. And when you think about it, that information reveals a lot about you. </p>
<p>Maybe you’re thinking of traveling to Hawaii, or are worried about a medical test result — or a topic that’s even more private — so you turn to the Web for information. Unfortunately, Web browsers do track your search history. And they associate that information with your IP (Internet Protocol) address, which essentially identifies you and your location much as a return address does. If you value your privacy, then that fact may be a cause for concern. </p>
<p><strong>Two Ways to Hide Your Search History </strong><br>
Even if you’re using a private browsing mode, your IP information is still being collected. The only methods for hiding your search history and staying anonymous online are to use a <a href="https://community.norton.com/en/blogs/norton-protection-blog/what-vpn-and-why-you-should-use-vpn-public-wi-fi">virtual private network</a> (VPN), such as <a href="http://us.norton.com/wifi-privacy" rel="nofollow">Norton WiFi Privacy</a>, or a special anonymization service, like Tor. </p>
<p>Tor, a shortened form of “The Onion Router,” works by sending your encrypted and re-encrypted data through several random nodes on the Internet, creating a circuitous route. It’s similar to how you might try to throw someone off your trail while playing hide-and-seek in the woods: by taking a hard-to-follow route and erasing your footprints. Because the various nodes only know the IP address from the node before and after, none of the nodes knows the complete pathway the data takes. Plus, each completed pathway is only valid for 10 minutes and then Tor generates new random paths. However, your data is not encrypted at the exit node.</p>
<p>With a VPN, your online activities are anonymized and protected because the VPN masks your IP address and encrypts your data throughout the entire transmission. Instead of sending information directly from your IP address, by using a VPN service the VPN server’s IP address is the one associated with your activity. If your VPN service provider has servers around the world, you could appear to be connecting to the Internet from Berlin when you’re actually in Mumbai. </p>
<p>If privacy and anonymity are important to you, remember that your search history isn’t as private as you might think, but there are options for protecting your information from prying eyes.</p>
<p><strong>Want to know more about the dangers of using public Wi-Fi, and how to protect your private information on public hotspots? Read these blogs to learn even more tips about staying safe on Wi-Fi — even at home.</strong></p>
<p><a href="https://community.norton.com/en/blogs/norton-protection-blog/dos-and-don%E2%80%99ts-using-public-wi-fi">The Dos and Don’ts of Using Public Wi-Fi</a></p>
<p><a href="https://community.norton.com/en/blogs/norton-protection-blog/risks-public-wi-fi">The Risks of Public Wi-Fi</a></p>
<p><a href="https://community.norton.com/en/blogs/norton-protection-blog/what-vpn-and-why-you-should-use-vpn-public-wi-fi">What Is a VPN? And Why You Should Use a VPN on Public Wi-Fi</a></p>
<p><a href="https://community.norton.com/en/blogs/norton-protection-blog/your-summer-vacation-guide-mobile-device-and-public-wi-fi-security">Your Summer Vacation Guide to Mobile Device and Public Wi-Fi Security</a></p>
<p><a href="https://community.norton.com/en/blogs/norton-protection-blog/why-hackers-love-public-wifi">Why Hackers Love Public Wi-Fi</a></p>
<p><a href="https://community.norton.com/en/blogs/norton-protection-blog/how-avoid-public-wi-fi-woes-business-trip">How to Avoid Public Wi-Fi Woes on a Business Trip</a></p>
<p><a href="https://community.norton.com/en/blogs/norton-protection-blog/30sectech-what-vpn">#30SecTech Video: What Is a VPN?</a></p>
<p><a href="https://community.norton.com/en/blogs/norton-protection-blog/how-safe-surfing-4g-vs-wi-fi">How Safe Is Surfing on 4G vs. Wi-Fi?</a></p>
<p><a href="https://community.norton.com/en/blogs/norton-protection-blog/what-no-log-vpn-network">What Is a No-Log VPN Network?</a></p>
<p><a href="https://community.norton.com/en/blogs/norton-protection-blog/keep-your-home-wi-fi-safe-7-simple-steps">Keep Your Home Wi-Fi Safe in 7 Simple Steps</a></p>
Wed, 28 Sep 2016 15:00:47 +0000https://community.norton.com/de/node/1386741Can a mobile phone battery track you?https://community.norton.com/de/node/1383961
<p><img src="/en/system/files/u7098741/mobile-battery-tracking-fb.png"></p>
<p>With this little known exploit, a mobile phone’s battery life can actually be used to track online behavior. <a href="http://www.macworld.com/article/3105005/os-x/privacy-problems-on-the-web-even-your-devices-battery-life-can-be-used-to-track-you.html" rel="nofollow">Security researchers have found that the battery status API</a> of mobile devices can be used to track people online. In some instances, this can be used to upsell services purchased through a mobile app, ride sharing “surge pricing” for example. How else can this be used? Here’s what you need to know about the privacy and security issues raised.</p>
<p><strong>What is the Battery Status API</strong></p>
<p>The Battery Status API was introduced in HTML5, and this was intended to give site owners information so that a version of websites designed for users on low power devices could be served. This API “allows site owners to see the percentage of battery life left in a device, as well as the time it will take to discharge or the time it will take to charge, if connected to a power source” according to a <a href="https://www.theguardian.com/technology/2016/aug/02/battery-status-indicators-tracking-online" rel="nofollow">news report on the research</a>.</p>
<p>This is all seemingly harmless information. But as the security researchers pointed out, the combination of battery life as a percentage and battery life in seconds creates a pseudo identifier for each mobile device. That is, if the device can be identified from one out of 14 million possible combinations.</p>
<p>An AdBlocker or a VPN cannot prevent someone from taking advantage of the battery status API to identify you and track the sites you visit. However, there is some degree of safety in numbers -- you’re one of 14 million possible computers.</p>
<p>It isn’t precisely known if website owners, whether an advertiser or company, are actively using or tracking information from the battery status API. As the story develops, privacy or security implications can be better known. Want to learn more about protecting your mobile privacy and security? Read on for a few best practices.</p>
<p><strong>Mobile Security Best Practices</strong></p>
<ul>
<li>
<strong>Download apps from official app stores. </strong>Third-party app stores may not put apps through the same rigor as official app stores such as the Google Play Store or Apple’s App Store.</li>
<li>
<strong>Avoid connecting to public wi-</strong><strong>fi from your mobile.</strong> An unsecure wi-fi hotspot could put your mobile data at risk.</li>
<li>
<strong>Check an application’s settings before you download.</strong> Beware of apps that ask you to disable settings that can make your device security vulnerable or allows access to data on your phone’s memory that can compromise your privacy.</li>
<li>
<strong>Use a reputable mobile security app</strong>. <a href="http://us.norton.com/norton-mobile-security" rel="nofollow">Norton Mobile Security</a> scans apps before you download using App Advisor (powered by Norton Mobile Insight) which automatically lets you know about malware, privacy and other risks. This proactive protection also includes lost or stolen device recovery that set off an alarm to find it fast, or see the location of your missing phone or tablet on a map.</li>
</ul>
Fri, 16 Sep 2016 17:05:19 +0000https://community.norton.com/de/node/1383961Keep Your Home Wi-Fi Safe in 7 Simple Stepshttps://community.norton.com/de/node/1382161
<p><img src="/en/system/files/u7098741/7steps-safe-home-wifi-fb.png">It is beginning to feel like the Internet is a basic necessity for existence in the 21st century. With all our devices connected to the Internet, we have an indescribable physical mobility that leads to increased productivity. It is safe to say that the Internet is for everyone and does not limit itself to the tech savvy. Unfortunately, when not safeguarded, the Internet can be a playground for nefarious activities caused by people with malicious intent. </p>
<p>Take a home wireless network as an example. Almost every member of the family accesses it through laptops, PCs, cell phones and tablets. With the Internet of Things, there is a gamut of other elements in the home that access the Wi-Fi. A small vulnerability in the home Wi-Fi network can give a criminal access to almost all the devices that access that Wi-Fi. This could spell trouble for bank accounts, credit card details, child safety, and a whole lot of other concerns. </p>
<p>The following tips can help secure your home Wi-Fi network against unauthorized access. </p>
<p><strong>1. Change the default name of your home Wi-Fi</strong> </p>
<p>The first step towards a safer home Wi-Fi is to change the SSID (service set identifier). SSID is the network’s name. Many manufactures give all their wireless routers a default SSID. In most cases it is the company’s name. When a computer with a wireless connection searches for and displays the wireless networks nearby, it lists each network that publicly broadcasts its SSID. This gives a hacker a better chance of breaking into your network. It is better to change the network’s SSID to something that does not disclose any personal information thereby throwing hackers off their mission. </p>
<p><strong>2.</strong> <strong>Make your wireless network</strong> <strong>password</strong> <strong>unique and strong</strong> </p>
<p>Most wireless routers come pre-set with a default password. This default password is easy to guess by hackers, especially if they know the router manufacturer. When selecting a <a href="https://community.norton.com/en/blogs/norton-protection-blog/password-managers-are-key-secure-passwords">good password</a> for your wireless network, make sure it is at least 20 characters long and includes numbers, letters, and various symbols. This setting will make it difficult for hackers to access your network. </p>
<p><strong>3. E</strong><strong>nabling network encryption</strong> </p>
<p>Almost all wireless routers come with an <a href="https://community.norton.com/en/blogs/norton-protection-blog/password-managers-are-key-secure-passwords">encryption</a> feature. By default it is turned off. Turning on your wireless router’s encryption setting can help secure your network. Make sure you turn it on immediately after your broadband provider installs the router. Of the many types of encryption available, the most recent and effective is “WPA2.” </p>
<p><strong>4. Turn</strong> <strong>off</strong> <strong>network</strong> <strong>name</strong> <strong>broadcasting </strong> </p>
<p>When using a wireless router at home, it is highly recommended that you disable network name broadcasting to the general public. This feature is often useful for businesses, libraries, hotels and restaurants that want to offer wireless Internet access to customers, but it is usually unnecessary for a private wireless network. </p>
<p><strong>5. Keep your router’s software up</strong> <strong>to</strong> <strong>date</strong> </p>
<p>Sometimes router’s firmware, like any other software, contains flaws that can become major vulnerabilities unless they are quickly fixed by firmware releases from the manufacturer. Always install the latest software available on the system and download the latest security patches to ensure no security hole or breach is left open to online predators. </p>
<p><strong>6. Make sure you have a good firewall</strong> </p>
<p>A “firewall” is designed to protect computers from harmful intrusions. Wireless routers generally contain built-in firewalls but are sometimes shipped with the firewall turned off. Be sure to check that the wireless router’s firewall is turned on. In case your router doesn’t have such a firewall, make sure you install a good firewall solution on your system to watch for malicious access attempts to your wireless network. </p>
<p><strong>7. Use VPNs to access your network</strong> </p>
<p>A <a href="https://community.norton.com/en/blogs/norton-protection-blog/what-vpn-and-why-you-should-use-vpn-public-wi-fi">virtual private network</a>, or VPN, is a group of computers or networks that work together over the Internet. Individuals can use VPNs, like <a href="https://us.norton.com/wifi-privacy" rel="nofollow">Norton WiFi Privacy</a> as a method to secure and encrypt their communications. When you connect to a VPN, a VPN client is launched on your computer. When you log in with your credentials your computer exchanges keys with another server. Once both computers have verified each other as authentic, all your Internet communication is encrypted and secured from outside prying. </p>
<p>Most of all, check what devices connect to your home network and make sure they have reliable security software like <a href="http://us.norton.com/norton-security-antivirus" rel="nofollow">Norton Security</a> installed against viruses and spyware. </p>
Thu, 08 Sep 2016 21:31:52 +0000https://community.norton.com/de/node/1382161Stop Stressing: 10 Internet Safety Rules To Help Keep Your Family Safe Onlinehttps://community.norton.com/de/node/8343
<p><img class="norton-image-center" src="/en/system/files/u2038063/Internet-safety-rules-fnl.png">Children today can access more information than any generation before. Because of the Internet they now have a wealth of information that can enrich their lives in new and wondrous ways. But the Internet also has the potential to harm us, and the people we love. Too often we read about another company falling victim to a cyber attack, or a friend’s email or social network account being hacked. These dangers are real.</p>
<p>And though there are real reasons to protect your kids and your data from cyber thieves, you shouldn’t need to shy away from the advantages the Internet has to offer your family. The bad guys may be smart, but you can be smarter.</p>
<p>Here are 10 ways you can protect your family’s devices so they can go online, without worry.</p>
<p><strong>1. Realize that cyber security is a moving target.</strong> Cybercriminals are constantly coming up with new threats, so you need to be conscientious about downloading the latest security updates and patches and watching the news for any new threats.</p>
<p><strong>2. Get wise to phishing.</strong> You may be sophisticated enough to know not to click on a URL that’s supposedly from your bank or a friend, but does everyone in your household? Tell your kids about phishing and warn them not to click on URLs from an email or social network message. Get a security program that recognizes and blocks dodgy URLs.</p>
<p><strong>3. Watch out for scams.</strong> There are other ways to trick you into entering information. Even some so-called legitimate businesses can trick you into signing up for recurring annual payments and the like. Watch your credit card statements closely.<br><br><strong>4. Use a password management system.</strong> Passwords are the primary defense against hacks for most people and its no secret that it’s often a pretty flimsy one. Bolster your defense with a password management program. Best of all, this way you only need to remember one password.</p>
<p><strong>5. Keep social networks secure. </strong>There’sa good chance that at least one person in your house is on a social network. Unfortunately, social networks have become a draw for cybercriminals. Keep a close eye on your friends’ social network accounts. If someone messages you who hasn’t done so in a while, then be suspicious. Your friend’s account may have been hacked. </p>
<p><strong>6. Identify the threat in your household.</strong> Your home Wi-Fi network is another entry point for hackers. Make sure you have a hard-to-crack password and consider security software that identifies “intruders” on the network.</p>
<p><strong>7. Educate kids about online safety.</strong> When it comes to cyber-security, kids are often the weakest link. Get security software that keeps kids from clicking on the wrong links and visiting the wrong sites. Teach kids about suspicious activity online and encourage them to ask for help if something seems suspicious.</p>
<p><strong>8. Don’t forget mobile devices.</strong> Your phone and tablet need as much security protection as your PC. Make sure you’ve got a full security solution that covers your mobile devices as well. Put a passcode on your tablets and phones too.</p>
<p><strong>9. Use a credit card.</strong> Credit cards are insured, so use that rather than your debit card.</p>
<p><strong>10. When in doubt, call support.</strong> The best security software programs offer 24/7 support. If you ever have any suspicions you’ve been hacked, call for help.</p>
<p><br><span><a href="http://us.norton.com/norton-family-premier" rel="nofollow">Norton Family</a> can help you buy peace of mind without sacrificing your family’s ability to learn and stay connected. It’s your single solution that protects up to five of your devices, whether it’s your desktop, mobile or tablet. And it’s incredibly intelligent- actively providing protection at all times, detecting online threats before they hit, so, when the new school year comes, your family will be ready to “Go Boldly” into new discoveries.</span></p>
Thu, 18 Aug 2016 19:10:10 +0000https://community.norton.com/de/node/8343What Is VoIP?https://community.norton.com/de/node/1375821
<p><img class="norton-image-center" src="/en/system/files/u7131691/what-is-voip-fb.png">VoIP is an acronym for “voice over Internet Protocol.” That means any phone call that takes place over the Internet, rather than on landlines or through mobile towers. This alternative to traditional phone calls is gaining in popularity exponentially with both companies and consumers. Skype, Google Voice, and FaceTime are well-known and extremely popular examples of Internet telephony services. The question is: Are phone calls made over the Internet vulnerable to standard online security risks? The answer is yes, as is any other information transmitted this way, especially in light of <a href="https://community.norton.com/en/blogs/security-covered-norton/symantec-discovery-leads-malicious-app-steals-viber-photos-and-videos">recent hacks to VoIP apps</a>. Read on to find out how to secure your VoIP calls.</p>
<p><strong>Security Concerns with VoIP and Similar Services</strong></p>
<p>As with any communication that takes place over the Internet, there are security risks particular to this communication method. However, like all other business you transact on the Internet, some simple, common-sense precautions will go a long way toward keeping your personal information and connections secure and private:</p>
<ul>
<li>When using any kind of VoIP or similar method of making phone calls, make sure you keep your application software up to date. Often hackers use known exploits in the system to access your information, so it’s important to keep the client itself updated.</li>
<li>It’s equally important to keep your operating system and Internet security suite updated. These are two of the main points of entry for potential hackers.</li>
<li>Securing your wireless network is especially important when using VoIP, because a lot of times your phone is going directly through your router. Having <a href="https://community.norton.com/en/blogs/norton-protection-blog/how-securely-set-your-home-wi-fi-router">a more secure router</a> is one way to foil any potential attacks against your VoIP system.</li>
<li>Use strong passwords to log in to messaging systems. One of the simplest ways that your account can become compromised is by using a weak password.</li>
<li>Consider using a VPN to secure your Internet connection. <a href="http://us.norton.com/wi-fi-privacy" rel="nofollow">Norton WiFi Privacy</a> is a virtual private network app that secures all the information that is sent or received on your network.</li>
</ul>
<p>Remember that when you’re using the Internet, the best thing that you can do is become a harder target than the next guy. By exercising some common-sense precautions, you can make hackers look for easier targets, protecting you and your family.</p>
Thu, 18 Aug 2016 15:11:29 +0000https://community.norton.com/de/node/1375821Pop-Cultural Relevance of Hacking in Today's Worldhttps://community.norton.com/de/node/1375181
<p><img class="norton-image-center" src="/en/system/files/u2038063/popculture-fb.png">When hacking was first introduced in film and television, it was nowhere near as prevalent as it is today. The threat landscape was years away from becoming what it is now, so hacking and cybercrime wasn’t quite the household name it is today, therefore, there was a wide unfamiliarity of it within the public eye.</p>
<p>Directors and writers have struggled with how to portray hacking in film simply because the act of hacking in real life is not very interesting or visually compelling. It’s just lines of code scrolling down a computer screen. In order to keep the viewer entertained they used cheesy visuals and animations to portray the mysterious act of hacking. Unfortunately, the viewer didn’t really learn anything, and hacking was used more as a device to help move the plot forward.</p>
<p>As cybercrime is now grabbing major news headlines, the entertainment industry is trying to jump in on the popularity of the subject, however it’s still not terribly accurate. As a result, we have seen an influx of hacking-centric television shows popping up across our screens. In the past few years we have seen television shows such as CSI: Cyber, Person of Interest, Scorpion, Numb3rs, Mr. Robot and more. While many of these have stepped away from the cheesy visuals, and have accepted the fact that hacking is what it is, most still don’t portray the real reality of cybercriminals- it’s much more than frantically typing keystrokes across a computer keyboard.</p>
<p>Then, the overnight sensation Mr. Robot showed up on the scene. If you’re not familiar with the show, the premise is about a group of hackers trying to take down an “evil” mega-corporation to help save the world from the clutches of crippling debt. However, the show is so much more than that.</p>
<h4>Why It's Important to Get Hacking Right in the Media Now More Than Ever</h4>
<p><img class="norton-image-center" src="/en/system/files/u2038063/Mr%20Robot%20DefCon1.png">I recently <a href="https://community.norton.com/en/blogs/norton-protection-blog/defcon-24-hacking-make-world-better-place">attended DefCon 24</a> in Las Vegas, where there was a panel featuring the show’s cyber-consulting team. The discussion was centered on how the show is made, and the hacking behind it. The show’s creator started out with an interest in computer science, and even attended university for it. However, he ended up trading cyber security for film and television, and years later, Mr. Robot was born.<br><br>
The cyber consulting team consists of Kor Adana, who is a writer &amp; technical supervisor for the show, Dark Tangent who is the founder of DefCon, Marc Rogers head of information security at CloudFlare, Ryan Kazanciyan Chief Security Architect at Tanium and Andre McGregor, former FBI agent with a computer engineering background and current Director of Security for Tanium.</p>
<p>Two of the main inspirations for the show was the fact that the show’s creator is from Egypt and visited relatives in Egypt who were involved with the Arab Spring. He was inspired by seeing all the young people who wanted to change their world and were doing so with technology. Secondly, considering his computer science background, he shared the frustration with the hacking community on how terribly wrong it was portrayed on film. He decided that he wanted to do it right and in a realistic, yet compelling and authentic way.<br><br>
The show has many complex layers to it- the main character is portrayed as extremely brilliant, yet suffers from social anxiety, depression and other mental issues, which are actually quite rampant within the hacking community. Many hackers spend hours alone in front of their computers, isolated from the real world, and as a result suffer real, mental health issues that can even lead to suicide within the community. To the consultants on this show, it isn’t just about getting the onscreen hacking accurate; it’s about expanding the universe into the very real hacking community and diving deep into the complicated mind of a hacker. The main character, Elliot, is an excellent example of a Grey Hat Hacker. His intentions for his actions are nothing but good, and he views himself as changing the world for the better. However, his actions are highly illegal. Adding the element of humanizing the hacker makes it very real for the viewer, and in some ways, very relatable as well.</p>
<h4><strong>Hacking for Realz and How It Can Educate People</strong></h4>
<p>The attention to details that go into the technical aspects of the show are so accurate that if the consulting team is unable to successfully perform the proposed hack, then the script is rewritten around one that they can. A lot of the hacking is true to life, <a href="https://community.norton.com/en/blogs/security-covered-by-norton">mirroring real life headlines</a>. Other hacks were proof of concept hacks that were performed at DefCon and BlackHat conferences.</p>
<p>In addition to the ornate detail put in to the hacking, one of the other great aspects of the show is that it demonstrates different versions of cybercrime that can happen to the average person, it in a realistic, yet simplistic way that any viewer can understand. The show covers <a href="https://community.norton.com/en/blogs/norton-protection-blog/data-breaches-arent-going-away-what-you-need-know">data breaches</a>, <a href="https://community.norton.com/en/blogs/norton-protection-blog/what-social-engineering">social engineering</a>, <a href="https://community.norton.com/en/blogs/norton-protection-blog/how-clean-your-online-digital-footprint">insecurity of personal information</a> online, and more.</p>
<p>There is a scene in the show where the group is trying to gain access to a company’s network. One of the characters drops some stray USB drives in the parking lot, with malware embedded on it, in the hopes that it will attract someone’s curiosity and they’ll plug it in to see what is on the drive. There’s another scene where Elliot explains how he knows everything about his therapist, down to who she is dating. It was all based on what he found out by searching online, only knowing her full name and profession.</p>
<p>During the panel, I had a chance to ask the team what their hopes were for the normal user to get out of the show. There is an extreme highlight on education, however it’s subtle on the show. They teach by example instead of just throwing inaccuracies into the script to try to prove a point.</p>
<p>The team expressed a growing concern about the fact that a lot of people know how to use their apps on their devices and browse the Internet, however, they don’t know the multitude of ways that they can become vulnerable to cybercriminals. They hope that the show can shine a light on those vulnerabilities in the hopes of increasing levels of awareness.</p>
<p>The show also brings an awareness to how companies handle consumer data and that they should be held accountable for insecure data practices. The team hopes that the show inspires consumers to expect more out of the companies that handle our data, and to even put pressure on those companies to implement better security standards.</p>
Mon, 15 Aug 2016 21:10:00 +0000https://community.norton.com/de/node/1375181How To Talk to Your Kids About Cyberbullying https://community.norton.com/de/node/1373901
<p><img class="norton-image-center" src="/en/system/files/u2038063/talk-about-cyberbullies-fb.png">Cyberbullying is not very different from the ill reputed bullying that happens in the school yard. It has the same psychological and social implication that leaves the formative minds of children insecure. What makes cyberbullying a little more intense than bullying is it not limited to the school yard.</p>
<p>According to a 2015 <a href="http://cyberbullying.org/2015-data" rel="nofollow">survey</a> 34.4% of students between the ages of 11 and 15 have been cyberbullied. This includes children who have been threatened online to be hurt, had rumors spread about them, or had mean and hurtful comments or pictures of them online.</p>
<p>This onslaught of hateful messages follows children everywhere they go. Left with no respite, many children avoid interaction with adults and peers, show a drop in grades, display anger, depression, self harm and in extreme cases resort to suicide. Children don’t like to talk about such incidents. They are often embarrassed to admit they are cyberbullied or they don’t know that what is happening to them is a type of cyberbullying. They also feel no one will understand what they are going through and will try to fight it alone.</p>
<p>Parents, educators and caregivers need to recognize the signs of cyberbullying and do whatever it takes to help the victims. Bombarding them with questions like “Are you being bullied?” will only drive them further away. Instead find out what their school day feels like. Ask “Who did you have lunch with?” “What are the kids in school talking about these days?” Most children will respond with some answer that will give you an insight about what’s going on in school.</p>
<h3>Here are few ways parents can talk to their children about cyberbullying:</h3>
<h4><strong>1. Discuss.</strong></h4>
<p>Ask your child about what he/she knows about the recent rise in cyberbullying. Children don’t like to come up and say they are victims. It is better to talk about an incident reported in the news and see your child’s view on it.</p>
<h4>2. Assure</h4>
<p>Be there for them. Assure your child that you will be there for him/her if such a thing were to happen to them even if they are somewhat responsible for it. Let them know that you will keep all conversations between the two of you private and will not intervene unless it’s absolutely necessary.</p>
<h4><strong>3. Cyber rules</strong></h4>
<p>Every home should have certain guidelines and rules for the usage of technology. Besides the amount of time children spend online, teach them online etiquette. It’s as simple as expecting them to behave online the way they would in real life. This means they should not</p>
<ul>
<li>use another person’s cell phone or computer without his/her permission</li>
<li>circulate embarrassing photographs or video about another person</li>
<li>forward hurtful or embarrassing messages or media</li>
<li>use anonymous or unrecognizable screen names to communicate</li>
<li>use foul or abusive language that could embarrass or hurt others</li>
</ul>
<h4><strong>4. Explain</strong></h4>
<p>Treat your children like adults when you are explaining the rules to them. Let them know why they are enforced in the first place. The use of technology is a privilege and must be handled responsibly. Make them understand that breaking rules has consequences that are beyond your control. There are laws that protect victims of cybercrime.</p>
<h4><strong>5. Safety first</strong></h4>
<p>Talk to them about how important cyber safety is. Keep their computers, laptops and cell phones protected with a comprehensive security suite tailored to protect children from online threats. Encourage your children to block and ignore people who send hateful messages.</p>
<h4><strong>6. Empathy</strong></h4>
<p>Let your child know that you understand that there are two sides to each story and you will do your best to support your child. If your child knows someone who is being bullied encourage your child to convince the victim to report the incident to the school office.</p>
<p>Remind your child that there is nothing to be ashamed of when he/she is a victim of cyberbullying. It’s the cyberbullies who should be ashamed of their actions. They are unhappy people who want to have control over your child’s feelings so that he/she feels as badly as they do. There is always a solution to every problem in life. So instead of dwelling on it, encourage your child to engage on activities that excite them like sports, hobbies, hanging out with positive thinking friends. And if there is a need seek help from parents, teachers, and trusted adults, they have got your back.</p>
<p>Want to know more about cyberbullying? Read our blog <a href="https://community.norton.com/en/blogs/norton-protection-blog/what-cyberbullying">What is Cyberbullying?</a></p>
Mon, 15 Aug 2016 20:00:00 +0000https://community.norton.com/de/node/1373901DefCon 24- Hacking to Make the World a Better Placehttps://community.norton.com/de/node/1374231
<p><img class="norton-image-center" src="/en/system/files/u2038063/rr-defcon2-tmpl-fb.png">Did you know that an attacker can flood your house via the water dispenser on your connected refrigerator? Or that bluetooth enabled locks can be picked from ¼ of a mile away using radio frequencies? I didn’t either, until I attended this year’s <a href="https://community.norton.com/en/blogs/norton-protection-blog/norton-defcon">DefCon 24</a>, an annual hacking convention in Las Vegas.</p>
<p>While a hotel in Las Vegas full of 22,000 hackers sounds like it might not be a good idea, it’s just the opposite. The purpose of this conference is to bring together Internet security professionals from all over the world to help educate, inform and learn how to make the Internet a safer place for all. There’s much more to this conference that meets the eye. In addition to the normal educational talks, there were a lot of interactive events in the form of contests, live hacking, villages and more.</p>
<p>Part two in a series about our trip to DefCon, we will be exploring the emerging threats that came out of the conference, what we learned, and other things that surprised us while we were there.</p>
<h4>Highlight on Personal Education in Cyber Security<br>
</h4>
<p>A lot of the talks focused on protecting users via cyber security software, but there was also a huge emphasis on educating users. Your personal cyber security is a two-pronged approach. In this day and age, no matter what platform you use, including mobile devices, it is imperative that you use Internet security software such as <a href="http://us.norton.com/norton-security-with-backup" rel="nofollow">Norton Security</a>. However, not all threats are computer based. There are so many other tactics that attackers use to try to get at your personal info. They stalk social media sites, professional networking websites, try to fool you with phishing emails and even fraudulent phone calls. You can’t expect a computer program to protect you from other human beings, only you can do that. The best approach is to become familiar with the common tactics used in scams, smishing, social engineering and more. When it comes to the fight against cybercriminals, knowledge really is power.</p>
<p>We’ve put together a primer for you to become familiar with some of the more common threats out there:<br><br><a href="https://community.norton.com/en/blogs/norton-protection-blog/malware-101-what-malware">Malware 101: What Is Malware?</a><br><a href="https://community.norton.com/en/blogs/norton-protection-blog/how-can-i-tell-if-i-have-malware-and-what-can-i-do-about-it">How Can I Tell If I Have Malware and What Can I Do About It?</a><br><a href="https://community.norton.com/en/blogs/norton-protection-blog/how-protect-yourself-phishing-scams">How To Protect Yourself From Phishing Scams</a><br><a href="https://community.norton.com/en/blogs/norton-protection-blog/sneaky-spammer-tactics-and-how-avoid-them">Sneaky Spammer Tactics and How To Avoid Them</a><br><a href="https://community.norton.com/en/blogs/norton-protection-blog/what-social-engineering">What is Social Engineering?</a><br><a href="https://community.norton.com/en/blogs/norton-protection-blog/importance-general-software-updates-and-patches">The Importance of General Software Updates and Patches</a><br><a href="https://community.norton.com/en/blogs/norton-protection-blog/how-choose-secure-password">How To Choose a Secure Password</a><br><a href="https://community.norton.com/en/blogs/norton-protection-blog/how-clean-your-online-digital-footprint">How to Clean Up Your Online Digital Footprint</a><br><a href="https://community.norton.com/en/blogs/security-covered-norton/cyber-security-top-tips-2016">Cyber Security Top Tips for 2016</a></p>
<p><img class="norton-image-center" src="/en/system/files/u2038063/servers.png"><strong>Contests:</strong><br>
There were over 25 real-time contests going on during the convention, open to all, from novice to advanced hackers. These contests ranged from tasks such as cracking a password, planting a file on a machine, finding vulnerabilities in IoT devices, social engineering phone calls and more. The purpose of these contests were to try and get into the mindset of an attacker, in order to help professionals refine their skills by teaching them how the other side thinks and lives.</p>
<p><strong>Kids Events:</strong><br><img class="norton-image-left" src="/en/system/files/u2038063/rootz_1.jpg">There was actually a mini-conference inside of DefCon aimed at children called <a href="https://r00tz.org" rel="nofollow">R00tz Asylum</a>. They may be young, but don’t be too quick to call them newbies. There were workshops, contests and talks all aimed at children, ranging from reverse engineering malware, hacking, social engineering, cryptography and more. All with a heavy focus on growing the next generation of cyber security professionals, and using their white hat hacker skills for good.</p>
<p><strong>Villages:</strong><br>
The purpose of the villages is two-fold. In the front of the rooms, they held talks, while in the back; there was real-time hacking occurring based on the village’s theme.</p>
<p><strong>Crypto and Privacy Village </strong><br><img class="norton-image-right" src="/en/system/files/u2038063/crypto-and-privacy-village_1.png">This village focused heavily on privacy, ranging from topics about personal online footprints to how companies can build better security into their products. In addition to a heavy focus on privacy for the user, there was also a presence of the Federal Trade Commission (FTC), the FBI and the Electronic Frontier Foundation (EFF) to help inform people how law enforcement is trying to get on top of cybercrime. The FTC was actually recruiting hackers there to help them figure out how to crack down on better security and privacy in commercial services and products.</p>
<p><strong>Social Engineer Village </strong><br><img class="norton-image-left" src="/en/system/files/u2038063/SEVillage_2.png">If you’re not familiar with <a href="https://community.norton.com/en/blogs/norton-protection-blog/what-social-engineering">social engineering</a>, also known as “human hacking,” you should be. This is one of the more prevalent threats out there that Internet security software can’t protect you against. Social engineering relies on human-to-human interaction via phone calls, text messages, and even face to face interactions. One of the most fascinating parts of this village was the social engineering phone call competition. Contestants had to do reconnaissance on a specific company, and see how much sensitive information they could get about the company over the phone by using a fake persona.<br><br><strong>IoT Village</strong><br><img class="norton-image-right" src="/en/system/files/u2038063/IOTV_0.png">This village was all about the Internet of Things, and just how secure they are. Contestants were hacking connected refrigerators, thermostats, routers, medical devices, and more. This event also hosted the very first router hacking competition, which led to the discovery of 15 new zero day vulnerabilities to be shared with the research community. There was also a huge focus on how manufacturers should be more security-centric on their devices. The FTC was also involved in this village, sharing their plans on how to get manufacturers to make better security improvements in IoT. </p>
<p>I think that the most amazing thing about this conference is knowing that there is a community of thousands of people, from all walks of life working 24/7 keeping you safe.</p>
Thu, 11 Aug 2016 22:27:19 +0000https://community.norton.com/de/node/1374231What Is Smishing?https://community.norton.com/de/node/1373611
<p><img class="norton-image-center" src="/en/system/files/u2038063/smishing-tmpl-fb.png">A form of <a href="https://community.norton.com/en/blogs/norton-protection-blog/how-protect-yourself-phishing-scams">phishing</a>, smishing is when someone tries to trick you into giving them your private information via a text or SMS message. Smishing is becoming an emerging and growing threat in the world of online security. Read on to learn what smishing is and how you can protect yourself against it.</p>
<p>Put simply, smishing is any kind of phishing that involves a text message. Often times, this form of phishing involves a text message in an SMS or a phone number. Smishing is particularly scary because sometimes people tend to be more inclined to trust a text message than an email. Most people are aware of the security risks involved with clicking on links in emails. This is less true when it comes to text messages.</p>
<p>Smishing uses elements of <a href="https://community.norton.com/en/blogs/norton-protection-blog/what-social-engineering">social engineering</a> to get you to share your personal information. This tactic leverages your trust in order to obtain your information. The information a smisher is looking for can be anything from an online password to your Social Security Number to your credit card information. Once the smisher has that they can often start applying for new credit in your name. That’s where you’re really going to start running into problems.</p>
<p>Another option used by smisher is to say that if you don’t click a link and enter your personal information that you’re going to be charged per day for use of a service. If you haven’t signed up for the service, ignore the message. If you see any unauthorized charges on your credit card or debit card statement, take it up with your bank. They’ll be on your side.</p>
<h4><strong>How to Know If You’re Being Smished</strong></h4>
<p>In general, you don’t want to reply to text messages from people you don’t know. That’s the best way to remain safe. This is especially true when the SMS comes from a phone number that doesn’t look like a phone number, such as “5000” phone number. This is a sign that the text message is actually just an email sent to a phone. You should also exercise basic precautions when using your phone such as:</p>
<ul>
<li>Don’t click on links you get on your phone unless you know the person they’re coming from.</li>
<li>Even if you get a text message with a link from a friend, consider verifying they meant to send the link before clicking on it.</li>
<li>A full-service <a href="http://us.norton.com/products" rel="nofollow">Internet security suite</a> isn’t just for laptops and desktops. It also makes sense for your mobile phone.</li>
<li>A VPN such as <a href="http://us.norton.com/wi-fi-privacy" rel="nofollow">Norton WiFi Privacy</a> is also an advisable option for your mobile devices. This will secure and encrypt any communication taking place between your mobile and the Internet on the other end.</li>
<li>Never install apps from text messages. Any apps you install on your device should come straight from the official app store. These programs have vigorious testing procedures to go through before they’re allowed in the marketplace.</li>
<li>Err on the side of caution. If you have any doubt about the safety of a text message, don’t even open it.</li>
</ul>
<p>Almost all of the text messages you get are going to be totally fine. But it only takes one bad one to compromise your security. With just a little bit of common sense and caution, you can make sure that you don’t become a victim of identity theft. </p>
Tue, 09 Aug 2016 17:48:01 +0000https://community.norton.com/de/node/1373611Norton @ DefConhttps://community.norton.com/de/node/1373581
<p><img class="norton-image-center" src="/en/system/files/u2038063/DefCon-tmpl-fb.png">This year, Norton visited <a href="https://www.defcon.org" rel="nofollow">DefCon 24</a>, a hacking conference held in Las Vegas. Established in 1993, this conference is designed to bring together people from all realms of the Internet security sector to explore the latest threats that are currently on the Internet, and to learn how to get ahead of them. This year, the conference had a record-breaking attendance of 22,000 people ranging from <a href="https://community.norton.com/en/blogs/norton-protection-blog/what-difference-between-black-white-and-grey-hat-hackers">hackers, coders</a>, journalists (me!), security researchers and even federal government employees.<br><img class="norton-image-left" src="/en/system/files/u2038063/DefCon%201.png"></p>
<p>This was my first time attending this conference, and although I did my research on it, it was beyond my expectations. My primary reason for wanting to attend DefCon was to see what this event is doing to help make the Internet a better place, and share it with our readers.</p>
<p>The conference hosts a multitude of learning events, contests, speaking engagements and social activities. There was a lot of focus on the vulnerabilities of Internet of Things, how to improve <a href="http://us.norton.com/mostdangeroustown2/bonus/why-does-online-privacy-matter" rel="nofollow">privacy standards</a>, and <a href="https://community.norton.com/en/blogs/norton-protection-blog/what-social-engineering">social engineering</a>.</p>
<p>My favorite part of the convention was the social engineering section- also known as “hacking the human.” The threats out there have reached beyond our computers and mobile devices, and now cybercriminals are targeting people in the real world. After all, there’s no security software available for our brains, yet. Therefore, this is really where the importance of cyber security via education comes in. While computer programs can block malicious code, they cannot block the scammer that calls you on your telephone, or manages to sneak through your spam filter. However, you can “hack” your own brain to help protect against those threats by educating yourself as much as possible.​</p>
<p>What was most impressive to me was the community. Everyone in attendance <img class="norton-image-right" src="/en/system/files/u2038063/DefCon%202_1.jpg">​had a common bond- making the Internet a safer place. It didn’t matter where you came from, or what you did- hackers freely talked to law enforcement, coders became friends with journalists- it was all about the sharing of information on how to make a better Internet for every single person that uses it.</p>
<p>This is part one of a multi-part series we will be publishing this week. We will be investigating the emerging threats that we learned about at the conference, and we will teach you how to stay ahead of them. We will also be exploring the importance of personal cyber security education and the pop-cultural relevance of hacking in today’s world, featuring the television show Mr. Robot.</p>
<p>You can read more about how hackers are trying to make the world the better place in the second installment of our series: <a href="https://community.norton.com/en/blogs/norton-protection-blog/defcon-24-hacking-make-world-better-place">DefCon 24- Hacking to Make the World a Better Place</a></p>
Tue, 09 Aug 2016 15:33:16 +0000https://community.norton.com/de/node/1373581How to Securely Set Up Your Home Wi-Fi Routerhttps://community.norton.com/de/node/1368691
<p><img class="norton-image-center" src="/en/system/files/u7131691/home-wifi-router-security-tw.png">Wireless Internet access is one of the modern conveniences of our time. However, your home wireless router can also be an access point for hackers. If your Wi-Fi router isn’t secured properly, you could be letting anyone with a wireless-enabled device gain access to your home network. That means you’re opening up your emails, banking information, and maybe even details of your smart home’s daily schedule to criminals. </p>
<p><strong>Basic Wireless Security</strong></p>
<p>Every router should have a password to keep out the bad guys. Some routers come with default passwords, but you should change these during setup. Creating a new password for your wireless router is easy. Almost anyone can do it, and it will only take a couple of minutes. Specific instructions vary from one router to another, but the basic idea is this: </p>
<p>1. All wireless routers have a numerical address. If you’ve lost the instructions, you can probably find yours by searching online for your router’s model number. </p>
<p>2. In Security Settings, create a name for the router, and a password, and then select a type of encryption (more below). Do not name your router something that can easily be associated with you, such as your last name. </p>
<p>3. Make sure you choose a strong password that you can remember, but one that’s not <br>
easy to guess. </p>
<p>4. Don’t forget to save the updated information when prompted. Your router is now secured from roaming hackers. </p>
<p><strong>Different Types of Encryption</strong></p>
<p>Depending on your router, you might have options for different kinds of encryption. The major ones for commercial routers include: </p>
<p>● Wired Equivalent Privacy (WEP): This is the oldest and most popular form of router encryption available. However, it is the least secure of all encryption protocols. <br>
● Wi-Fi Protected Access (WPA): The Wi-Fi Alliance came up with WPA to offer an encryption protocol without the shortcomings of WEP. This is also a less secure form of encryption, partly because of legacy hardware and firmware that still used WEP as their main protocol. However, it is a significant improvement over WEP. <br>
● Wi-Fi Protected Access 2 (WPA2): This is the most secure and most recent form of encryption available. You should always select WPA2 if it is available.<br>
● Advanced Encryption Standard: When possible, you’ll want to use AES on top of WPA2 or WPA. This is the same type of encryption used by the federal government to secure classified information. Routers made after 2006 should have the option to enable this on top of WPA2. </p>
<p>Moreover, a good full-service <a href="http://us.norton.com/norton-security-antivirus" rel="nofollow">Internet security suite</a> will come with a firewall, giving you an added layer of protection. </p>
<p>Setting up security for your wireless network doesn’t take much time at all and will do much to protect you from hackers. Even if you don’t have any neighbors you want to prevent from borrowing your Wi-Fi, you’ll be protecting yourself from more dangerous snoops. Especially now that so many homes are connected and various devices are using Wi-Fi, you’ll be wise to protect all of the information those devices contain. Don’t take any chances. Just a few minutes of selecting the right home Wi-Fi settings can mean all the difference to your connected world.</p>
<p><strong>Want to know about the dangers of using public Wi-Fi, and how to protect your private information on public hotspots? Read these blogs to learn tips about staying safe on public Wi-Fi.</strong></p>
<p><a href="https://community.norton.com/en/blogs/norton-protection-blog/dos-and-don%E2%80%99ts-using-public-wi-fi">The Dos and Don’ts of Using Public Wi-Fi</a></p>
<p><a href="https://community.norton.com/en/blogs/norton-protection-blog/risks-public-wi-fi">The Risks of Public Wi-Fi</a></p>
<p><a href="https://community.norton.com/en/blogs/norton-protection-blog/what-vpn-and-why-you-should-use-vpn-public-wi-fi">What Is a VPN? And Why You Should Use a VPN on Public Wi-Fi</a></p>
<p><a href="https://community.norton.com/en/blogs/norton-protection-blog/your-summer-vacation-guide-mobile-device-and-public-wi-fi-security">Your Summer Vacation Guide to Mobile Device and Public Wi-Fi Security</a></p>
<p><a href="https://community.norton.com/en/blogs/norton-protection-blog/why-hackers-love-public-wifi">Why Hackers Love Public Wi-Fi</a></p>
<p><a href="https://community.norton.com/en/blogs/norton-protection-blog/how-avoid-public-wi-fi-woes-business-trip">How to Avoid Public Wi-Fi Woes on a Business Trip</a></p>
<p><a href="https://community.norton.com/en/blogs/norton-protection-blog/30sectech-what-vpn">#30SecTech Video: What Is a VPN?</a></p>
<p><a href="https://community.norton.com/en/blogs/norton-protection-blog/how-safe-surfing-4g-vs-wi-fi">How Safe Is Surfing on 4G vs. Wi-Fi?</a></p>
Thu, 28 Jul 2016 14:16:07 +0000https://community.norton.com/de/node/1368691What Is a No-Log VPN Network?https://community.norton.com/de/node/1366431
<p><img src="/en/system/files/u7131691/1200x628_NSOS_Young_Male_With_Headphones.jpg">Virtual private networks, or VPNs, allow people to use public Wi-Fi hotspots safely by encoding, or encrypting, the data sent or received during the user’s online session. This shields users’ privacy and anonymity by protecting their personal information. Many VPN providers also safeguard their customers’ anonymity by offering a no-log network, meaning that they do not collect, or “log,” any information transmitted through the network. They don’t save information about your personal details, where you go online, what you download, or what you search for. Therefore your privacy and anonymity are protected from everybody — even your VPN provider. </p>
<p><strong>Trust Is Key </strong><br>
Why do VPN service providers do this? If you’re entrusting a company to encrypt and protect everything you do online, shouldn’t you fundamentally trust that business to follow the same practices? Most VPN companies believe the answer is yes. They don’t log any of your information because they don’t want it. These no-log VPN service providers, like <a href="http://us.norton.com/wifi-privacy" rel="nofollow">Norton WiFi Privacy</a>, won’t build databases of your personal information to sell to third parties. </p>
<p><strong>Read the Fine Print</strong> <br>
Sometimes VPN providers do have to collect a minimal amount of information, such as your email, but these exceptions to the rule should be available in the provider’s <a href="https://community.norton.com/en/blogs/norton-protection-blog/software-terms-service-and-privacy-policies-explained">Privacy Policy</a>. </p>
<p>Remember: All VPN services are different. Not all VPN providers operate no-log networks, so <a href="https://community.norton.com/en/blogs/norton-protection-blog/what-vpn-and-why-you-should-use-vpn-public-wi-fi">you should choose your VPN service carefully</a> if this is important to you.</p>
<p><strong>Want to know more about the dangers of using public Wi-Fi, and how to protect your private information on public hotspots? Read these blogs to learn even more tips about staying safe on public Wi-Fi.</strong></p>
<p><a href="https://community.norton.com/en/blogs/norton-protection-blog/dos-and-don%E2%80%99ts-using-public-wi-fi">The Dos and Don’ts of Using Public Wi-Fi</a></p>
<p><a href="https://community.norton.com/en/blogs/norton-protection-blog/risks-public-wi-fi">The Risks of Public Wi-Fi</a></p>
<p><a href="https://community.norton.com/en/blogs/norton-protection-blog/what-vpn-and-why-you-should-use-vpn-public-wi-fi">What Is a VPN? And Why You Should Use a VPN on Public Wi-Fi</a></p>
<p><a href="https://community.norton.com/en/blogs/norton-protection-blog/your-summer-vacation-guide-mobile-device-and-public-wi-fi-security">Your Summer Vacation Guide to Mobile Device and Public Wi-Fi Security</a></p>
<p><a href="https://community.norton.com/en/blogs/norton-protection-blog/why-hackers-love-public-wifi">Why Hackers Love Public Wi-Fi</a></p>
<p><a href="https://community.norton.com/en/blogs/norton-protection-blog/how-avoid-public-wi-fi-woes-business-trip">How to Avoid Public Wi-Fi Woes on a Business Trip</a></p>
<p><a href="https://community.norton.com/en/blogs/norton-protection-blog/30sectech-what-vpn">#30SecTech Video: What Is a VPN?</a></p>
<p><a href="https://community.norton.com/en/blogs/norton-protection-blog/how-safe-surfing-4g-vs-wi-fi">How Safe Is Surfing on 4G vs. Wi-Fi?</a></p>
Fri, 15 Jul 2016 15:05:02 +0000https://community.norton.com/de/node/1366431Pokémon Go Real World Risks and Safety Tipshttps://community.norton.com/de/node/1365751
<p><img class="norton-image-center" src="/en/system/files/u2038063/pokemon-go-logo-01-1%20FB.jpg"><br>
The goal of this game is quite the opposite of all other games- to get you out into the world and interacting with other people playing the game. If anything, parents have been applauding this game for getting their children off of the couch and out getting some actual exercise. So far, my favorite headline about the game has been “<a href="http://gizmodo.com/sore-legs-become-pandemic-as-pokemon-go-players-acciden-1783402931" rel="nofollow">Sore Legs Become Pandemic As Pokémon Go Players Accidentally Get Exercise</a>.” </p>
<p>However, I’ve also stumbled upon some other news headlines that are quite worrisome, that affect people’s virtual and physical privacy. As a result, instead of writing a typical article that gives you tips and tricks on gameplay, we’re going to give you tips and tricks on how to maintain your privacy and physical safety while you go “catch ‘em all.”</p>
<p>Since there are many factors that come into play when using this app, we are going to delve into these aspects in a three part series examining the <a href="https://community.norton.com/en/blogs/norton-protection-blog/pok%C3%A9mon-go-cyber-security-and-privacy-guidelines">risks in the cyber realm</a>, the real world and the <a href="https://community.norton.com/en/blogs/norton-protection-blog/pok%C3%A9mon-go-parents-guide-children">safety of children</a> while playing the game.</p>
<h3><strong><u>Real World Risks</u></strong></h3>
<p><br><img class="norton-image-center" src="/en/system/files/u2038063/main.1.jpg">The game works using augmented reality to lead you to various Pokémon. Augmented reality is a form of technology that blends together the real world and computer gameplay. It uses Google maps along with your GPS to help you navigate to nearby Pokémon. The only way to make real progress in the game is to go outside and start walking. </p>
<h3><strong>Physical Safety</strong></h3>
<p><br><img class="norton-image-right" src="/en/system/files/u2038063/Untitled_0.png">Injuries:<br>
While the game always reminds you upon loading to be aware of your surroundings, it’s still pretty easy for users to inadvertently become “glued” to their screens while in gameplay. This can result in a lot physical mishaps. I’ve seen a lot of comments online about how people end up walking into trees, tripping over curbs and getting scratched and banged up in various ways.</p>
<p><em>Pro-tip: </em>You don’t have to be staring at your phone while walking around in order to see nearby Pokémon- you just have to leave it open and in your pocket- it will notify you by vibrating or making a sound when there is one nearby to catch.</p>
<p>Robberies:<br>
One major trending story I’ve seen is about criminals luring victims to Pokéstops in order to <a href="http://www.cnn.com/2016/07/11/tech/pokemon-go-crazy-events/index.html" rel="nofollow">rob them</a>. Pokéstops are real-world locations that players flock to so they can interact with other people playing the game. Always be aware of your surroundings, the people around you, and if possible, team up and use the buddy system when venturing out to public spaces (gameplay is super fun with some friends, too). Don’t be afraid to call 911 if you feel like you are in immediate danger or end up in a dangerous predicament.</p>
<p>Don’t play while driving:<br>
Yes, there have already been stories of people driving around trying to catch Pokémon. Just don’t do it. Instead, bring along a navigator to handle the scouting of the elusive creatures, and when you find one, pull over safely and legally before you start launching your Pokéballs.</p>
<p>Your battery will die:<br>
Because the game has to be open while playing, and is constantly using your GPS signal and contacting their servers, this will be a huge drain on your battery. It’s a great idea to invest in a portable battery charger so you don’t end up lost with a dead phone in an unfamiliar area.</p>
<p>Use common sense:<br>
I think the most useful section in the <a href="https://support.pokemongo.nianticlabs.com/hc/en-us/articles/221993967" rel="nofollow">Trainer’s Manual</a> is “Adhere to the rules of the human world.” This means obey local laws such as trespassing, looking both ways before crossing a street, being courteous and polite to other players and to watch where you’re walking! Another great tip is to always tell someone where you are going to be.</p>
<p>As with all things on the Internet landscape, it is always best to exercise some caution, especially when being introduced to new technology. However, the fact that there are risks should not encourage users to shy away from new things. The most important thing is to educate yourself on the risks and be aware. Once you’re empowered with this knowledge, you can embrace this new technology and go catch that Charizard!</p>
<p>Related articles to Pokémon Go:<br><a href="https://community.norton.com/en/blogs/norton-protection-blog/pok%C3%A9mon-go-cyber-security-and-privacy-guidelines">Pokémon Go Cyber Security and Privacy Guidelines</a><br><a href="https://community.norton.com/en/blogs/norton-protection-blog/pok%C3%A9mon-go-parents-guide-children">Pokémon Go Parents Guide for Children​</a><br><a href="https://community.norton.com/en/blogs/security-covered-norton/fight-malicious-pokemon-go-apps-help-norton-mobile-security">Fight Off Malicious Pokemon GO! Apps With The Help Of Norton Mobile Security​</a></p>
Thu, 14 Jul 2016 16:00:00 +0000https://community.norton.com/de/node/1365751Pokémon Go Parents Guide for Childrenhttps://community.norton.com/de/node/1365731
<p><img class="norton-image-center" src="/en/system/files/u2038063/pokemon-go-logo-01-1%20FB.jpg">One of the great things about this game is that is popular amongst both children and adults, so our main suggestion is to play with them. This can be a great opportunity for you to engage and play along with your children!</p>
<p>First things first, with all apps your children are interested in, download the app and play it yourself to become familiar with what your children will be doing. This way, you can become more informed about the gameplay, and you can talk to your child about how to be safe while using it.</p>
<p>This is part two of a three part series where we are going to delve into examining the risks in the <a href="https://community.norton.com/en/blogs/norton-protection-blog/pok%C3%A9mon-go-cyber-security-and-privacy-guidelines">cyber realm</a>, the <a href="https://community.norton.com/en/blogs/norton-protection-blog/pok%C3%A9mon-go-real-world-risks-and-safety-tips">real world</a> and the safety of children while playing the game.</p>
<h4><strong>Stranger Danger:</strong></h4>
<p>While the purpose of the game is to be social, real-life rules still apply. Tell your kids about stranger-danger. A huge part of the gameplay involves common areas called gyms and Pokéstops, which will attract a good amount of strangers playing the game. You can still encourage your children to interact with new people, but set some guidelines. Always make sure they are supervised by a trusted adult when venturing into these public areas. If you can’t go with them, or you have an older teen, be sure to have them establish a buddy system and check in with you regularly, as it’s just not safe for anyone of any age to aimlessly wander around unfamiliar areas of town by themselves.</p>
<h4><img class="norton-image-left" src="/en/system/files/u2038063/Screenshot_20160709-103955-1200x1412.png"></h4>
<h4><strong>Be Aware of “Lures” </strong></h4>
<p>Lures are an item that can be both bought in the game and earned by leveling up to higher levels. The purpose of a Lure is to attract more Pokémon at a Pokéstop.</p>
<p>When a user sets up a Lure at a Pokéstop, other players in the area can see them on the map, alerting them that the location has a surplus of Pokémon. What’s potentially dangerous about these is that <em>anyone </em>can set these up, which could potentially make the game attractive to child predators.</p>
<p><strong>Establish Boundaries</strong><br>
Since this game can send children wandering off to areas unknown, it’s best that they are supervised by a responsible adult, or if old enough, they use the buddy system to play in groups.</p>
<p>If they do wander about their neighborhood in search for these elusive creatures, set limits on where your kids can go without you.</p>
<p>Limit those areas by setting boundaries in your neighborhood where your kids would normally play. If they want to leave those boundaries, be sure to insist that they call you to discuss their plans, such as where they are going, for how long, who they are going with and to check back in when they are done.</p>
<h4><strong>Location Tracking</strong></h4>
<p>If your kids are going to be out on their own, use a location tracking app in case of emergencies. <a href="https://family.norton.com/web/" rel="nofollow">Norton Family Parental Control</a> has apps for both iOS and Android that will track your child’s smartphone in real time with their GPS coordinates on a map.</p>
<h4><strong>In App Purchases</strong></h4>
<p>This game, like other games does have in app purchases to buy things like Pokécoins and other various powerups. In this case, it’s probably a good idea to put on parental controls that help control in-app spending.</p>
<ul>
<li>For iOS, Apple has a feature called “<a href="https://support.apple.com/en-us/HT201089" rel="nofollow">Ask to Buy</a>,” that will alert you to whenever a family member initiates a new purchase or free download. You are then able to control what they purchase from your own device.</li>
<li>The Google Play Store has an <a href="https://support.google.com/googleplay/answer/1626831?hl=en" rel="nofollow">option to turn on authentication</a> when making in-app purchases. This means that means certain information, like a password, must be entered on your device to make a purchase.</li>
</ul>
<p>You may want to look into these in order to avoid becoming the next headline “My Child Spent 5,000 Dollars on Pokémon Go.”</p>
<p>So now that you are armed with the information you need to ensure your children have safe and enjoyable gameplay, it’s time for you to venture out with your kids and help the “catch ‘em all!”</p>
<p>Related articles to Pokémon Go:<br><a href="https://community.norton.com/en/blogs/norton-protection-blog/pok%C3%A9mon-go-cyber-security-and-privacy-guidelines">Pokémon Go Cyber Security and Privacy Guidelines</a><br><a href="https://community.norton.com/en/blogs/norton-protection-blog/pok%C3%A9mon-go-real-world-risks-and-safety-tips">Pokémon Go Real World Risks and Safety Tips​</a><br><a href="https://community.norton.com/en/blogs/security-covered-norton/fight-malicious-pokemon-go-apps-help-norton-mobile-security">Fight Off Malicious Pokemon GO! Apps With The Help Of Norton Mobile Security​</a></p>
Wed, 13 Jul 2016 16:00:00 +0000https://community.norton.com/de/node/1365731Pokémon Go Cyber Security and Privacy Guidelineshttps://community.norton.com/de/node/1365721
<p><img class="norton-image-center" src="/en/system/files/u2038063/pokemon-cybersecure-fb2.png">In one way or another, you’ve probably heard of Pokémon Go, the latest new app that seems to be taking over smartphones everywhere. When I first heard about the app, it piqued my curiosity, given my passion for cyber security. Admittedly, I became addicted immediately, which lead me to research how the game works, how to play it, and what the possible security risks are that come along with the game.</p>
<p>Firstly, it is important to note that this game is not your average smartphone game. It uses a technology known as augmented reality, which is a blend of real life and technology. There are many layers to this game, using real time GPS locations, geocaching technology and the world around you. Since there are many factors that come into play when using this app, we are going to delve into these aspects in a three part series examining the risks in the cyber realm, <a href="https://community.norton.com/en/blogs/norton-protection-blog/pok%C3%A9mon-go-real-world-risks-and-safety-tips">the real world</a> and the <a href="https://community.norton.com/en/blogs/norton-protection-blog/pok%C3%A9mon-go-parents-guide-children">safety of children</a> while playing the game.</p>
<h4><strong>What Are the Risks?</strong></h4>
<p>This game has literally become an overnight sensation and cybercriminals are looking to cash in on this huge opportunity in a variety of ways.</p>
<h4><strong>Malicious Apps:</strong></h4>
<p>Since, the App isn’t available in all countries yet, just days after the official Pokémon Go App hit the market, researchers from Proofpoint discovered a Trojanized version of the app. According to <a href="https://www.proofpoint.com/us/threat-insight/post/droidjack-uses-side-load-backdoored-pokemon-go-android-app" rel="nofollow">Proofpoint’s blog</a> "Although we have not observed this malicious APK in the wild, it was uploaded to a malicious file repository service<strong> […] </strong>less than 72 hours after the game was officially released in New Zealand and Australia” So first thing’s first- when downloading the app, be sure to <a href="https://community.norton.com/en/blogs/norton-protection-blog/risks-third-party-app-stores">only download apps from trusted sources</a> such as the Google Play Store and the Apple App Store.<br>
Additionally, Norton has you covered when it comes to malicious Android apps. <a href="https://app.appsflyer.com/com.symantec.mobilesecurity?pid=Blog&amp;c=FakePokemonApps" rel="nofollow">App Advisor</a> automatically scans for malicious apps in the Google Play Store before they’re downloaded to your phone. </p>
<p>The most recent and most dangerous malicious app was a discovery made by a group of security researchers on July 15th. The first fake lockscreen app, dubbed “Pokémon GO Ultimate,” was found on the Google Play Store. Luckily, the researchers contacted Google quickly, and it has been removed from the app store. You can read more about this threat <a href="https://community.norton.com/en/blogs/security-covered-norton/fight-malicious-pokemon-go-apps-help-norton-mobile-security">here</a>.</p>
<h4><strong>Online Scams:</strong></h4>
<p><img src="/en/system/files/u2038063/pokemon%20-%20Copy.png">With all popular games, users are sure to scour the Internet for cheats and hacks online. Scammers are already on top of this, as fake websites have started popping up offering Pokécoins and other powerups from the game in exchange for filling out surveys or visiting questionable websites. Surveys may seem harmless, however, they can collect a lot of personally identifiable information about you, which could be used in identity theft. </p>
<p>Remember, if it sounds too good to be true, it probably is a scam. As of now, there is no legitimate way or “hack” to get Pokécoins except for buying them in the app. </p>
<h3><strong><u>Privacy Risks:</u></strong></h3>
<h4><strong>Review App Permissions:</strong></h4>
<p>It’s always important to evaluate what an app wants to access when it is installed. Sometimes, granting an app permission to areas of your device can leave your personal information exposed as well as that of others. If it doesn’t make sense to you, such as an app requesting permission to access your phone and SMS capabilities, you can always deny the app access to that part of your phone. Keep in mind however, that it may place limitations on how the app functions, or it may not function at all without the requested access. It’s really up to you to decide how much privacy to give away for a game, but at least be informed.<br><br>
Currently some iOS users and some Android users do not get asked permission to access anything. If signing in via Google, you are potentially allowing the game full access to your Google account. This means that the app has access to your contacts, e-mail, Google Drive documents, and more.</p>
<p>Niantic has released a statement saying that they have fixed the issue.<br>
Here’s the <a href="https://support.pokemongo.nianticlabs.com/hc/en-us/articles/222648408-Permissions-update" rel="nofollow">full statement</a> from the developer:</p>
<p><em>"We recently discovered that the Pokémon GO account creation process on iOS erroneously requests full access permission for the user’s Google account. However, Pokémon GO only accesses basic Google profile information (specifically, your User ID and email address) and no other Google account information is or has been accessed or collected. Once we became aware of this error, we began working on a client-side fix to request permission for only basic Google profile information, in line with the data that we actually access. Google has verified that no other information has been received or accessed by Pokémon GO or Niantic. Google will soon reduce Pokémon GO’s permission to only the basic profile data that Pokémon GO needs, and users do not need to take any actions themselves."</em></p>
<p>While you wait for this fix to come out, you can revoke permissions for <em>Pokémon Go</em> from your Google account on <a href="https://security.google.com/settings/security/permissions?pli=1" rel="nofollow">this page</a>. <br><img class="norton-image-center" src="/en/system/files/u2038063/GP.png"></p>
<h4><strong>Privacy Policy and Terms of Service:</strong></h4>
<p>In this day and age, it’s important to take a look at these documents in order to see what the app plans to do with your personal information.</p>
<p>One notable issue in the terms of service located inside of the app is that the links to the privacy policy, and the Pokémon GO Trainer guidelines were not hyperlinked, and you have to agree to all three of them before gameplay. </p>
<p><strong>Pokémon GO Terms of Service</strong><br><a href="https://www.nianticlabs.com/terms/pokemongo/en" rel="nofollow">https://www.nianticlabs.com/terms/pokemongo/en</a><br><img class="norton-image-center" src="/en/system/files/u2038063/Screen%20Shot%202016-07-12%20at%208.25.43%20AM.png"></p>
<p>In the terms of service, it is emphasized throughout the risks of danger during gameplay. The line that really caught my eye was:<br>
“<em>You agree that your use of the App and play of the game is at your own risk, and it is your responsibility to maintain such health, liability, hazard, personal injury, medical, life, and other insurance policies as you deem reasonably necessary for any injuries that you may incur while using the Services.”</em></p>
<p>I’ve never seen a Terms Of Service recommend that you get an insurance policy as a result of any injuries that may occur during gameplay, but this just reinforces how dangerous this game can become if you’re not paying attention to what you’re doing.</p>
<p><strong>Pokémon GO Trainer Guidelines</strong><br><a href="https://support.pokemongo.nianticlabs.com/hc/en-us/articles/221993967" rel="nofollow">https://support.pokemongo.nianticlabs.com/hc/en-us/articles/221993967</a><br>
According to the terms of service, users must adhere to the Trainer Guidelines. Since you can’t access these URLs in the application before agreeing them, it’s a good idea to go over all of these documents just to know exactly what you’re agreeing to.<br><img class="norton-image-center" src="/en/system/files/u2038063/Screen%20Shot%202016-07-12%20at%208.29.37%20AM_0.png"><br><strong>Pokémon GO Privacy Policy</strong><br><a href="https://www.nianticlabs.com/privacy/pokemongo/en" rel="nofollow">https://www.nianticlabs.com/privacy/pokemongo/en</a><br><img class="norton-image-center" src="/en/system/files/u2038063/Screen%20Shot%202016-07-12%20at%207.55.40%20AM.png"><img class="norton-image-center" src="/en/system/files/u2038063/Screen%20Shot%202016-07-12%20at%207.54.43%20AM.png">At the time of writing this article, Niantic and The Pokémon Company International issued this statement to us:<br><em>"We encourage all people playing Pokémon GO to be aware of their surroundings and to play with friends when going to new or unfamiliar places. Please remember to be safe and alert at all times. We are humbled by the overwhelmingly positive response to Pokemon GO and greatly appreciate the support of our fans."</em><br>
</p>
<p>The fact that there are risks should not encourage users to shy away from new things. The most important thing is to educate yourself on the risks and be aware. Once you’re empowered with this knowledge, you can embrace this new technology and go catch that Mewtwo!</p>
<p>Related articles to Pokémon Go:<br><a href="https://community.norton.com/en/blogs/norton-protection-blog/pok%C3%A9mon-go-parents-guide-children">Pokémon Go Parents Guide for Children</a><br><a href="https://community.norton.com/en/blogs/norton-protection-blog/pok%C3%A9mon-go-real-world-risks-and-safety-tips">Pokémon Go Real World Risks and Safety Tips​</a><br><a href="https://community.norton.com/en/blogs/security-covered-norton/fight-malicious-pokemon-go-apps-help-norton-mobile-security">Fight Off Malicious Pokemon GO! Apps With The Help Of Norton Mobile Security​</a></p>
Tue, 12 Jul 2016 23:10:00 +0000https://community.norton.com/de/node/1365721How Facial Recognition Software Workshttps://community.norton.com/de/node/1359141
<p><img src="/en/system/files/u2038063/facial-recognition-software-fb_0.png">If you’ve uploaded pictures to Facebook recently, you might have noticed that it has the uncanny ability to recognize people's faces. This is just one example of high-tech facial recognition software in action. Here’s what you need to know about this emerging technology.</p>
<h4><strong>How Facial Recognition Software Works</strong></h4>
<p>You’ve never given much thought to how you recognize a face, and probably even less to how a computer would do it. Still, it’s not news that human faces have certain qualities you recognize. The spacing of eyes on a face, the position and width of a nose, the shape of a hairline and chin -- these are all things that you unconsciously use to recognize someone’s face. A computer, however, can do this with reasonable efficiency precisely because when you put all of these metrics together, you get a mathematical formula for what someone looks like.</p>
<p>So how good is facial recognition software? Pretty good, but they’re still working out the kinks. If you have facial recognition software enabled on Facebook or another social media platform, you’ve probably noticed that it offers nearly as many comical results as accurate ones. Still, while the technology might not be 100 percent, it’s good enough. That raises some serious privacy concerns.</p>
<h4><strong>Why You Should Be Concerned About Facial Recognition Software</strong></h4>
<p>First and foremost, facial recognition software is data. As such, it can be collected and stored, often without the permission of the person in question. Once the information is collected and stored it’s open to being hacked. Platforms with facial recognition software haven't been the subject of major hacks yet, but as facial recognition technology spreads, your biometrics are going to be in the hands of more and more people.</p>
<p>There are also issues of ownership involved. Most people don’t know that when they sign up for social media platforms like Facebook, there’s some claim of ownership on the data that you give to Facebook. When it comes to pictures of you, once facial recognition software really starts breaking out and there are lots of companies collecting and collating this data, you might not even have to upload your images to the Internet to become compromised. Pictures of you on other people’s accounts or even in newspapers can be aggregated and sold to the highest bidder.</p>
<h4><strong>How You Can Protect Yourself </strong></h4>
<p>The problem with facial recognition software and privacy is that a lot of the usual safeguards don’t apply. You can’t change your face and even the sands of time aren’t going to do much to alter facial recognition software’s ability to identify you. Criminals have been identified by the FBI using facial recognition software and images of them taken nearly 20 years ago.</p>
<p>So what can you do? First of all, you can opt out of facial recognition technology on most social media platforms. This means that, at the very least, they won’t be aggregating your facial biometrics. Once you’ve done that, you can lock down your social media so that they can only be seen by your friends. This will prevent spiders and other programs that crawl the web looking for data from collecting your information.</p>
<p>Beyond that, your only real tactic for privacy is to wear a mask or some kind of concealing makeup when you’re in public. Facial recognition software is soon going to become prevalent in the public sphere. Barring new privacy legislation, there’s only so much you can do to protect yourself.</p>
Mon, 11 Jul 2016 23:00:00 +0000https://community.norton.com/de/node/1359141Watch "Zero Days," a Thrilling Look at the Cyber Warfare Stuxnet Virus That Took Down a Nuclear Power Planthttps://community.norton.com/de/node/1363411
<p><img class="norton-image-center" src="/en/system/files/u2038063/Unknown-1_4.png">Introducing “Zero Days,” the real-life cyber warfare documentary featuring Symantec cyber-security experts Eric Chien and Liam O’Murchu.</p>
<p><img src="/en/system/files/u2038063/Liam%20ZD%5B1%5D%5B1%5D.jpeg"><br>
You may have heard about the Stuxnet virus in the media over the years. However, brief news reports don’t even begin to uncover the darkness of this threat. In “Zero Days,” director Alex Gibney takes a deeper look at the sophisticated piece of weapons-grade malware that destroyed a part of an Iranian nuclear facility, as well as help facilitate espionage by spying on its target.</p>
<p><img src="/en/system/files/u2038063/Eric%20ZD%5B1%5D%5B1%5D.jpeg"></p>
<p>This thrilling documentary discusses the complexity of the virus with Symantec’s very own cyber-security experts Eric Chien and Liam O’Murchu. They discuss how this particular piece of malware was (and still is) unlike anything they have ever seen before, what they learned about it, and how it can change the future of cyber-warfare.</p>
<p>Available July 8th, 2016. You can watch the trailer below:</p>
<p>[norton-video:youtube-id:ikzAcK0l-ZM]</p>
<p>The documentary will be released <a href="http://www.zerodaysfilm.com" rel="nofollow">in theaters, on demand and on iTunes July 8.</a></p>
Thu, 07 Jul 2016 13:00:00 +0000https://community.norton.com/de/node/1363411How Safe Is Surfing on 4G vs. Wi-Fi?https://community.norton.com/de/node/1359151
<p><img src="/en/system/files/u2038063/how-safe-is-4G-vs-wifi-fb_0.png">You’re probably familiar with 3G, 4G, and Wi-Fi hotspots. In today’s increasingly connected mobile world, there are a variety of ways to get and stay connected to the Internet, but what’s really the safest way?<br><br>
Truth be told, nothing is 100% safe. However, there are ways that you can beef up your own security to get as close to that 100% as possible. It begins with understanding what these technologies are, and the risks that come along with them.</p>
<h3><strong>How Do Mobile Devices Connect to the Internet?</strong></h3>
<p>Let’s break down the three different ways your mobile device can connect to the Internet, and how these connections work:</p>
<h4><em>4G Connections</em></h4>
<p>4G-enabled devices connect to the Internet though their provider’s cellular connection. Instead of receiving a signal from an Internet Service Provider as the device would at home or work, it receives data from the cellular company in the same way it receives a mobile phone connection. 4G allows users to access the Internet anywhere they receive signal. Fortunately, data being sent via 4G is encrypted, making 4G safer than public Wi-Fi.</p>
<h4><em>Private Wi-Fi Connections</em></h4>
<p>These are the types of networks you would find in your office or at home. Private Wi-Fi connections, when properly set up, allow password-protected access and encryption to the data that is being sent and received.</p>
<h4><em>Public Wi-Fi Hotspots</em></h4>
<p>Public Wi-Fi hotspots are found in public places such as airports, coffee shops, malls, restaurants, and hotels — virtually anywhere, really. Public Wi-Fi is the least safe way to connect to the Internet, and it’s really a wildcard. There are so many unknown variables, but the main problem with using a public network is being unable to determine if it is 100% safe. You really can’t know if it’s safe or not unless you have a way to secure your connection, such as with a <a href="https://community.norton.com/en/blogs/norton-protection-blog/what-vpn-and-why-you-should-use-vpn-public-wi-fi">virtual private network</a>, or VPN.</p>
<h3><strong>Can 4G Be Hacked?</strong></h3>
<p>At the risk of sounding like a broken record, nothing connected to the Internet is 100% invincible to cybercriminals all the time. However, when it comes to 4G, hacking seems to still be in the proof-of-concept stage. Proof-of-concepts happen when <a href="https://community.norton.com/en/blogs/norton-protection-blog/what-difference-between-black-white-and-grey-hat-hackers">white hat hackers</a> (the good guys, who are usually researchers) look for ways they can compromise a system. There have been a few successful cases of people hacking into 4G via <a href="https://community.norton.com/en/blogs/norton-protection-blog/what-man-middle-attack">man-in-the-middle attacks (MITM)</a>.</p>
<p>An MITM attack is like eavesdropping. Attackers can place themselves either between two unsuspecting victims, or between the user and the app, or even between two machines, and “listen in” on the transmissions being sent back and forth.</p>
<p>So, for now, the short answer is yes, 4G can be compromised. However, it is much more difficult to hack than public Wi-Fi, which attackers mainly have their sights set on.</p>
<h3><strong>What’s the Safest Solution?</strong></h3>
<p>Since there are a few options in the ways you connect to the Internet via your mobile device, there is hope. When it comes to public Wi-Fi, there are more opportunities for attackers to exploit vulnerabilities via your connection over Wi-Fi than over 4G. As far as the security of these connections, here’s how they rank from most secure to least secure:</p>
<ol>
<li>Using a VPN over a cellular network or using a VPN over Wi-Fi</li>
<li>Cellular only</li>
<li>Wi-Fi only</li>
</ol>
<p>So, really, the safest way to ensure your security while on the go is to use a multi-layered approach. The use of anti-malware protection, firewalls, VPNs, and online common sense are also vital.</p>
<p>Norton WiFi Privacy is a VPN that encrypts all the information sent and received by your mobile device while you’re on public Wi-Fi, making your public connection private. <a href="http://us.norton.com/wi-fi-privacy" rel="nofollow">Download Norton WiFi Privacy now.</a></p>
<p><strong>Want to know more about the dangers of using public Wi-Fi, and how to protect your private information on public hotspots? Read these blogs to learn even more tips about staying safe on Wi-Fi — even at home.</strong></p>
<p><a href="https://community.norton.com/en/blogs/norton-protection-blog/dos-and-don%E2%80%99ts-using-public-wi-fi">The Dos and Don’ts of Using Public Wi-Fi</a></p>
<p><a href="https://community.norton.com/en/blogs/norton-protection-blog/risks-public-wi-fi">The Risks of Public Wi-Fi</a></p>
<p><a href="https://community.norton.com/en/blogs/norton-protection-blog/what-vpn-and-why-you-should-use-vpn-public-wi-fi">What Is a VPN? And Why You Should Use a VPN on Public Wi-Fi</a></p>
<p><a href="https://community.norton.com/en/blogs/norton-protection-blog/your-summer-vacation-guide-mobile-device-and-public-wi-fi-security">Your Summer Vacation Guide to Mobile Device and Public Wi-Fi Security</a></p>
<p><a href="https://community.norton.com/en/blogs/norton-protection-blog/why-hackers-love-public-wifi">Why Hackers Love Public Wi-Fi</a></p>
<p><a href="https://community.norton.com/en/blogs/norton-protection-blog/how-avoid-public-wi-fi-woes-business-trip">How to Avoid Public Wi-Fi Woes on a Business Trip</a></p>
<p><a href="https://community.norton.com/en/blogs/norton-protection-blog/30sectech-what-vpn">#30SecTech Video: What Is a VPN?</a></p>
<p><a href="https://community.norton.com/en/blogs/norton-protection-blog/how-safe-surfing-4g-vs-wi-fi">How Safe Is Surfing on 4G vs. Wi-Fi?</a></p>
<p><a href="https://community.norton.com/en/blogs/norton-protection-blog/what-no-log-vpn-network">What Is a No-Log VPN Network?</a></p>
<p><a href="https://community.norton.com/en/blogs/norton-protection-blog/keep-your-home-wi-fi-safe-7-simple-steps">Keep Your Home Wi-Fi Safe in 7 Simple Steps</a></p>
<p><strong>Save</strong><strong>Save</strong></p>
Mon, 04 Jul 2016 13:00:00 +0000https://community.norton.com/de/node/1359151Paying Friends Through a Mobile Payment Apphttps://community.norton.com/de/node/1359131
<p><img class="norton-image-center" src="/en/system/files/u2038063/mobile-payment-aps-fb.png">Mobile payment apps are changing the way we do business, but they can also be convenient ways to send money to friends and family. It’s easier than ever to send money to the people who need it, but also easier than ever for hackers to gain access to that money before it gets where you want it. How do you keep yourself and your money safe, while also being able to access the convenience of mobile payment apps?</p>
<h4><strong>How Mobile Payment Apps Work</strong></h4>
<p>You can pay using your phone, even without apps. Some companies, such as your phone company, allow you to pay your bill using standard text messaging. Mobile payment apps are a little different and come in a two main categories:</p>
<ul>
<li>Mobile payment apps using near-field communication technology or NFC.<br>
This is the type of mobile payment app where you put your phone near an object, sometimes another phone, for the sake of making a payment. Apple Pay and Android Pay are examples of this kind of mobile payment app.<br>
</li>
<li>Online wallet apps.<br>
This is where you send your money to a friend or family member without having to hold your phone near theirs or any other object. All you need to send money is someone’s email address. Your bank may offer a similar option.</li>
</ul>
<p>The difference is mainly in the method of the payment. Is the other person’s phone or some other object required or can you just send the money using an email address or user account name?</p>
<h4><strong>Making Sure Your Mobile Payment Is Secure</strong></h4>
<p>Of course, if you’re sending money, you’re going to want the application to be secure. Some tips to make your mobile payment app more secure include:</p>
<ul>
<li>
<a href="https://community.norton.com/en/blogs/norton-protection-blog/importance-two-factor-authentication">Two-factor authentication</a> needs you to enter a password and a second piece of information. Usually, this is a code sent to your phone registered with the mobile payment app.<br>
</li>
<li>Keep the app <a href="https://community.norton.com/en/blogs/norton-protection-blog/importance-general-software-updates-and-patches">updated</a>. One of the easiest ways for hackers to get into your private information is to exploit a known and public vulnerability. App updates patch these holes.<br>
</li>
<li>Another way that these holes get patched is by your operating system, so it’s important to keep your operating system updated as well.<br>
</li>
<li>You should also keep all the other apps on your phone up to date. Hackers who have found their way into one app might be well on their way to hacking into the rest of your phone.<br>
</li>
<li>Check your statements. It’s easy enough to do with a mobile payment system. All you have to do is open up your app and look for unusual charges. Don’t overlook small charges. A lot of times hackers and identity thieves will run trial charges of a few dollars or even a few cents to see if you will notice bigger charges.<br>
</li>
<li>Internet security software isn’t just for your laptop. It’s just as important, if not more so, for your mobile phone. Once you have <a href="https://play.google.com/store/apps/details?id=com.symantec.mobilesecurity" rel="nofollow">Internet security software on your phone</a> make sure to keep it updated.<br>
</li>
<li>
<a href="https://community.norton.com/en/blogs/norton-protection-blog/how-choose-secure-password">Password protect</a> and, if possible, encrypt the data on your phone. Apps exist that make your phone functionally useless to thieves here in the physical world. These apps often allow you to track down your phone as well, providing an added in-world security benefit.</li>
</ul>
<p>Your chances of getting hacked or otherwise compromised are relatively low. They get a lot better when you take common-sense security precautions to protect yourself and your family. By spending just a few minutes securing your device and your app, you can make big strides toward making sure that no one gets between you and the person you want to send money to.</p>
Fri, 01 Jul 2016 17:30:00 +0000https://community.norton.com/de/node/1359131#30SecTech: What Is a VPN?https://community.norton.com/de/node/1360811
<p><img class="norton-image-center" src="/en/system/files/u7131691/30Sectech_VPN-FB.png">There’s a good reason hackers love free public Wi-Fi. It’s because they can easily access information on unsecured Wi-Fi networks. So when you’re in a coffee shop or an airport checking your emails or paying bills while on public Wi-Fi, you could be letting cybercriminals spy on your sensitive and personal information.</p>
<p>VPNs, or virtual private networks, like <a href="http://us.norton.com/wi-fi-privacy" rel="nofollow">Norton WiFi Privacy</a> can turn those public Wi-Fi hotspots into secured private connections. Watch this short (30 seconds!) video to see how a <a href="https://community.norton.com/en/blogs/norton-protection-blog/what-vpn-and-why-you-should-use-vpn-public-wi-fi">VPN</a> could give you a new sense of security on Wi-Fi.</p>
<p>[norton-video:youtube-id:yC9hsjjvZ2g]</p>
<p><strong>Want to know more about the dangers of using public Wi-Fi, and how to protect your private information on public hotspots? Read these blogs to learn even more tips about staying safe on public Wi-Fi.</strong></p>
<p><a href="https://community.norton.com/en/blogs/norton-protection-blog/dos-and-don%E2%80%99ts-using-public-wi-fi">The Dos and Don’ts of Using Public Wi-Fi</a></p>
<p><a href="https://community.norton.com/en/blogs/norton-protection-blog/risks-public-wi-fi">The Risks of Public Wi-Fi</a></p>
<p><a href="https://community.norton.com/en/blogs/norton-protection-blog/what-vpn-and-why-you-should-use-vpn-public-wi-fi">What Is a VPN? And Why You Should Use a VPN on Public Wi-Fi</a></p>
<p><a href="https://community.norton.com/en/blogs/norton-protection-blog/your-summer-vacation-guide-mobile-device-and-public-wi-fi-security">Your Summer Vacation Guide to Mobile Device and Public Wi-Fi Security</a></p>
<p><a href="https://community.norton.com/en/blogs/norton-protection-blog/why-hackers-love-public-wifi">Why Hackers Love Public Wi-Fi</a></p>
<p><a href="https://community.norton.com/en/blogs/norton-protection-blog/how-avoid-public-wi-fi-woes-business-trip">How to Avoid Public Wi-Fi Woes on a Business Trip</a></p>
<p><a href="https://community.norton.com/en/blogs/norton-protection-blog/how-safe-surfing-4g-vs-wi-fi">How Safe Is Surfing on 4G vs. Wi-Fi?</a></p>
<p><a href="https://community.norton.com/en/blogs/norton-protection-blog/what-no-log-vpn-network">What Is a No-Log VPN?</a></p>
Fri, 01 Jul 2016 15:31:00 +0000https://community.norton.com/de/node/1360811How to Stay Safe When File Sharing Onlinehttps://community.norton.com/de/node/1359171
<p><img class="norton-image-center" src="/en/system/files/u2038063/safe-file-sharing-fb.png">File sharing technology is an easy way for individuals or institutions to transfer content on the internet. There are several peer-to-peer (P2P) applications and services available. Some applications are free and others offer paid subscriptions for larger storage capacity, speedier service or extra security. File sharing is a very common activity for most online users, but file sharing also makes you susceptible to <a href="https://community.norton.com/en/blogs/norton-protection-blog/data-breaches-arent-going-away-what-you-need-know">various online threats</a> including identity theft, infection or attack.</p>
<p>If you plan on using file sharing technology be sure personal data and other sensitive materials are secure and safeguarded before you engage with a file sharing service online. Here are some useful tips to help you understand the dangers of file sharing, and how prevent a malicious attack.</p>
<h4><strong>What Are the Risks?</strong></h4>
<p>Peer-to-Peer file sharing applications can put your personal information at risk. Most of the time, users are sharing data with people they know or conduct business with. But how can these individuals’ identities be validated online? The truth is it’s almost impossible to verify a source on file sharing applications, which means the users on the other end may not be who you think they are.</p>
<p>In the case of illegal downloads, like music and movies, users download content without any knowledge of the source. Both of these instances introduce security risks that put you and your <a href="https://community.norton.com/en/blogs/norton-protection-blog/what-happens-when-your-identity-stolen">personal data in jeopardy.</a></p>
<p>Attackers use file sharing applications to install spyware, <a href="https://community.norton.com/en/blogs/norton-protection-blog/malware-101-what-malware">malicious codes</a>, viruses, Trojan Horses, and worms. They do so by bundling the content you desire with these threats. When you download the content, you’re inviting in any number of security risks and, without proper safeguards, they can result in any number of security breaches.</p>
<p>Additionally, some file sharing interfaces expose your computer directories without your knowledge, allowing attackers to view information you might not have intended to share. You might also share personal data willingly, and assume it’s safe to do so because it’s being sent directly to known sources. The security features on fire sharing applications won’t keep out every criminal, especially because attackers are constantly evolving online. It’s never a good idea to share files you would rather keep private.</p>
<p>Finally, some file sharing applications will request open ports on your firewall. Firewalls are designed to encrypt communications going into and out of your computer so attackers can’t see what you’re sending or receiving. By breaking this barrier to allow content to download successfully, you’re putting your computer at risk of attack.</p>
<h4><strong>How to Stay Safe</strong></h4>
<p>The easiest way to ensure the safety of your personal information while using file sharing applications is to be aware of what you send and what you attempt to download. Don’t send highly sensitive material through file sharing services. Similarly, be aware of the content you’re downloading. Do not share or download illegal or pirated content. In the event that you are caught sharing or downloading illegal content, even if it’s accidental, you might be faced with fines or serious legal penalties. Moreover, using company property to download or share illegal content can result in legal actions and possible termination. Be aware of your actions online and steer clear of dangerous behaviors.</p>
<p>In addition to being vigilant about what you should and should not share via file sharing applications, make sure that your Internet Security software, such as <a href="http://us.norton.com/norton-security-antivirus/" rel="nofollow">Norton Security</a> is installed, activated, and up to date. Anti-virus software scans your computer for incoming threats and will recognize most viruses, provided it’s kept current. Stay on top of this, and it will greatly reduce your chances of enduring an online attack.</p>
<p>Additionally, you should install and enable a firewall. Some operating systems come with a built-in firewall so be sure that it’s enabled and working properly. If your computer doesn’t have a firewall, make sure to get one before you share or download files on a file sharing application.</p>
<p>File sharing can make our lives a little easier, but only if we take the necessary steps to protect ourselves online. Follow these tips, and you’ll greatly reduce your chances of attack, identity theft, or infection.</p>
Wed, 29 Jun 2016 17:00:00 +0000https://community.norton.com/de/node/1359171The Day I Thought Cybercriminals Left Me For Deadhttps://community.norton.com/de/node/1354771
<p><img class="norton-image-center" src="/en/system/files/u2038063/nadias-story-fb.png">Early on a Wednesday evening, I received a call from my doctor. Her voice, frantic on the line, proclaims, “I’m so happy to hear your voice- the strangest thing happened today. You were marked in our system as deceased for about 20 minutes.” I paused for a moment out of shock, and assured her I was very much alive and well. She went on to explain how she’d never seen anything like it before. As the initial shock wore off, we started to have a bit of a laugh on how bizarre this was.</p>
<p>It wasn’t all giggles. As an unfortunate side effect of me being “dead” for 20 minutes, all of my appointments and procedures I had scheduled were cancelled.</p>
<p>I sighed to myself, thinking, “Well, this is going to be a pain, making calls to six different doctors offices tomorrow.” As the evening went on, and I texted a few friends about it, laughing at how bizarre it was and making resurrection jokes (“And now your watch has ended” – GOT fans will get this) and didn’t think much of it for the rest of the evening.</p>
<p>The next morning I woke up and began my usual routine. Suddenly, the “cyber security” portion of my brain kicked in and said to me “Wait a minute, your healthcare provider reported you as <em>dead</em> yesterday!” That can’t be good, I thought to myself. Unfortunately, last year, my personal records were exposed in a data breach, so I know my information <em>is</em> out there. However, <a href="https://community.norton.com/en/blogs/norton-protection-blog/your-identity-exposed-tips-secure-your-identity-online">others may not</a>. The <a href="https://community.norton.com/en/blogs/norton-protection-blog/data-breaches-arent-going-away-what-you-need-know">problem with data breaches</a> is that there’s really no way to know if your information has been breached unless you’ve been notified by the company that had the breach, or something unexpected happens with <em>anything</em> tied to your name. New accounts you never applied for, fraud alerts from your financial institutions, and even being told that you had died. The key to staying ahead of identity thieves is <a href="https://community.norton.com/en/blogs/norton-protection-blog/how-avoid-identity-theft-online">keeping a close eye</a> on your credit reports, <a href="https://community.norton.com/en/blogs/norton-protection-blog/credit-monitoring-services-and-other-anti-fraud-protection">financial accounts</a> and any other accounts that contain your personal information.</p>
<p>Naturally, the panic set in- what do I do?! Yes, I am a cyber security professional, but I am also a person, like everyone else, like you reading this now.</p>
<p>I sat there and gathered my thoughts and said to myself- Nadia, you’ve got this- this is what you DO every day! Clearly this is an identity theft red flag.</p>
<p>I decided to start at the source, and that was with my medical group. After being connected to four different departments and enduring that stale hold music, I was finally told that my physician’s office would be able to look into the “events” in my chart and see what happened. Luckily, I have a friend at my doctor’s office, and told him about it. He said I shouldn’t worry about it too much, and it was probably human error. Somewhat comforting, I still thought I should make sure all my bases were covered.</p>
<p>While waiting to hear back from my friend at my doctors’ office, I decided to call my insurance company to make sure they knew that I was indeed alive. The funny thing about this whole predicament is that everyone I talked to was just as shocked as I was, which eventually led to chuckles and jokes, once again. While the shock of being told you had died was dumbfounding, at least the absurdity of the situation brought some humor into process.</p>
<p>On to more phone calls. Medical provider- check. Insurance company- check. “What’s next?” I thought to myself. Obviously, my credit report. I called up a <a href="https://community.norton.com/en/blogs/norton-protection-blog/credit-monitoring-services-and-other-anti-fraud-protection">credit reporting agency</a>, to check two things- one- that they knew I was alive, and two, if anything fishy has popped up on my report. Everything checked out OK there, but I did put a <a href="https://community.norton.com/en/blogs/norton-protection-blog/how-freeze-your-credit-report-and-when">90-day alert on my account</a>, which will notify me about any new inquiries or accounts. Better to be safe than sorry.</p>
<p>Luckily, in my case, this did turn out to be a “glitch,” however you can never be too careful. Identity theft is rampant both on and off the Internet. As the old adage goes, “if you see something, say something.” If anything strange happens to you, no matter how bizarre it may sound, check it out. It may be a glitch, but there’s a chance it might not be. </p>
Fri, 17 Jun 2016 21:35:37 +0000https://community.norton.com/de/node/1354771How to Avoid Public Wi-Fi Woes on a Business Triphttps://community.norton.com/de/node/1353441
<p><img class="norton-image-center" src="/en/system/files/u7131691/public-wifi-woes-fb.png">Now that summer is here, it’s not just families that will be filling airports and hotels. While other people may be vacationing, business travelers will continue to work their way around the country and the world. According to the quarterly GBTA Sentiment Business Traveler Index, these working travelers face challenges in staying productive on the go — and mobile connectivity is a large factor in the success of a business trip. Although often overlooked, staying secure on public Wi-Fi should also be an important part of business travel.</p>
<p><strong>Wi-Fi All the Time</strong></p>
<p>Because most business is now conducted online — from holding meetings to submitting expenses — perhaps it’s not surprising that business travelers demand Wi-Fi. In fact, the Global Business Traveler Association’s <a href="https://business.americanexpress.com/us/business-trends-and-insights/business-traveler/gbta-global-business-traveler-sentiment-index-oct-2015" rel="nofollow">October 2015 report</a> says 83% of business travelers want Wi-Fi wherever they go. And 76% are more likely to book a hotel if it offers free Wi-Fi.</p>
<p><strong>Planes, Trains, and Automobiles</strong></p>
<p>As Millennials increasingly hit the road for work alongside their more seasoned Baby Boomer colleagues, that demand for Internet connections 24x7 is likely to increase. These business travelers are the ones for whom the phrase, “There’s an app for that,” truly resonates. Booking a flight, looking up a train schedule, reserving a hotel room, and ordering an on-demand car service via apps are second nature to Millennial travelers. And although people may expect the always-connected Millennials to be more security smart than Baby Boomers, the <a href="http://us.norton.com/cyber-security-insights?inid=us_hho_nortoncom_clp_norton-hp-ribbon-award_nrpt" rel="nofollow">Norton Cybersecurity Insights Report</a> found 44% of Millennials were victims of online crime in 2015, while only 16% of Baby Boomers suffered the same experience.</p>
<p>Whatever generation they belong to, business travelers should be aware of the <a href="https://community.norton.com/en/blogs/norton-protection-blog/risks-public-wi-fi">dangers of using the Wi-Fi they demand</a>, which can range from malware distribution to <a href="https://community.norton.com/en/blogs/norton-protection-blog/what-man-middle-attack">man-in-the-middle attacks</a>, a form of eavesdropping. Some 64% would like to see airlines allow passengers to use mobile devices and online services while in flight. Many major airline carriers do offer Wi-Fi on specific routes, for limited amounts of time. However, as with other popular public Wi-Fi options such as in airports themselves, in-flight Wi-Fi services often are not secured. A journalist recently learned this the hard way when <a href="http://www.usatoday.com/story/tech/columnist/2016/02/24/got-hacked-my-mac-while-writing-story/80844720/" rel="nofollow">a hacker revealed that he’d been able to read the journalist’s emails in flight</a>.</p>
<p><strong>Hotel Hotspots</strong></p>
<p>Hotel Wi-Fi hotspots should be another area of concern for road warriors. The fact that 76% of business travelers are willing to select their hotel based on the availability of free Wi-Fi emphasizes how much they use this service. However, although many guests probably think that using hotel Wi-Fi is safe, it’s almost impossible to know if that free Wi-Fi, like any other hotspot in a public space, is secured and won’t possibly expose sensitive corporate information to eavesdroppers or hackers.</p>
<p><strong>5 Tips to Stay Safe on Public Wi-Fi During Business Travel</strong></p>
<p>Due to the security risks of public Wi-Fi, companies are beginning to ban employees from using free hotspots. Without a security solution such as a <a href="https://community.norton.com/en/blogs/norton-protection-blog/what-vpn-and-why-you-should-use-vpn-public-wi-fi">VPN (virtual private network)</a>, it’s up to workers to take precautions before they use a hotspot. Here are some tips to try to minimize the security risks of logging on to unsecured public Wi-Fi networks:</p>
<ol>
<li>Use a VPN to ensure that all data transmitted during your online sessions is encrypted. Norton WiFi Privacy is a VPN app that automatically turns on when it detects a public Wi-Fi network, protecting your information by <a href="https://community.norton.com/en/blogs/norton-protection-blog/encryption-how-utilize-it-online-and-why-it%E2%80%99s-important">encrypting</a> it and making your public connections private. <a href="us.norton.com/wi-fi-privacy" rel="nofollow">Learn more about Norton WiFi Privacy here</a>.</li>
<li>Select password-protected public Wi-Fi hotspots, even if this means you may need to buy a cup of coffee in order to get the password at a cafe.</li>
<li>Turn off any auto-connect settings for Wi-Fi or Bluetooth on your devices.</li>
<li>Pay attention to which network you’re selecting. Cybercriminals set up rogue hotspots with names that are close to that of the legitimate network you may be trying to connect to. If possible, check the name with your host if you’re not sure.</li>
<li>Don’t access any sensitive information or online accounts that contain such data if you’re on public Wi-Fi. </li>
</ol>
<p>Traveling for work may seem a mixed blessing to some people, but if travelers take the time to be careful about connecting to public Wi-Fi they’ll at least be able to rest easy knowing that their information and privacy — and their company’s — are protected.</p>
<p><strong>Want to know more about the dangers of using public Wi-Fi, and how to protect your private information on public hotspots? Read these blogs to learn even more tips about staying safe on public Wi-Fi.</strong></p>
<p><a href="https://community.norton.com/en/blogs/norton-protection-blog/dos-and-don%E2%80%99ts-using-public-wi-fi">The Dos and Don’ts of Using Public Wi-Fi</a></p>
<p><a href="https://community.norton.com/en/blogs/norton-protection-blog/risks-public-wi-fi">The Risks of Public Wi-Fi</a></p>
<p><a href="https://community.norton.com/en/blogs/norton-protection-blog/what-vpn-and-why-you-should-use-vpn-public-wi-fi">What Is a VPN? And Why You Should Use a VPN on Public Wi-Fi</a></p>
<p><a href="https://community.norton.com/en/blogs/norton-protection-blog/your-summer-vacation-guide-mobile-device-and-public-wi-fi-security">Your Summer Vacation Guide to Mobile Device and Public Wi-Fi Security</a></p>
<p><a href="https://community.norton.com/en/blogs/norton-protection-blog/why-hackers-love-public-wifi">Why Hackers Love Public Wi-Fi</a></p>
<p><a href="https://community.norton.com/en/blogs/norton-protection-blog/30sectech-what-vpn">#30SecTech Video: What Is a VPN?</a></p>
<p><a href="https://community.norton.com/en/blogs/norton-protection-blog/how-safe-surfing-4g-vs-wi-fi">How Safe Is Surfing on 4G vs. Wi-Fi?</a></p>
<p><a href="https://community.norton.com/en/blogs/norton-protection-blog/what-no-log-vpn-network">What Is a No-Log VPN?</a></p>
Thu, 16 Jun 2016 15:00:00 +0000https://community.norton.com/de/node/1353441Is Your Identity Exposed? Tips to Secure Your Identity Onlinehttps://community.norton.com/de/node/1350631
<p><img src="/en/system/files/u1694783/istr-data-theft-fb.png"></p>
<p>Did you know that 429 million identities were exposed in 2015? Findings from the <a href="https://www.symantec.com/security-center/threat-report">2016 Symantec Internet Security Threat Report</a> show that this number actually hides a bigger story. While there was a record number of 9 mega breaches in this year, companies are not required to disclose the full extent of a data breach. The total number of people affected by a data breach and whose identity is compromised as a result could be much greater. A conservative estimate by Symantec accounting for unreported breaches pushes the number of records lost in a data breach to more than a half billion, in 2015.</p>
<p><strong>What is a mega breach?</strong></p>
<p>A mega breach is a data breach of more than 10 million records. In one of the largest mega breaches in 2015, 78 million patient records were exposed in an Anthem data breach.</p>
<p><strong>How a data breach can expose your identity and other risks</strong></p>
<p>Compromised personal data resulting from a data breach can expose your identity to theft and fraud at the hands of cybercriminals. On average, a victim of cybercrime can spend 21 hours dealing with the impact. Imagine not only the potential financial loss, but also the time spent notifying financial institutions, updating account credentials, and a number of other inconveniences when your online identity is exposed.</p>
<p><strong>Take a closer look at data breaches by the numbers:</strong></p>
<p><img src="/en/system/files/u1694783/060216-Final-Data-Breach-Identity-Theft-ISTR-Infographic.png"></p>
<p><strong>Tips to Stay Safe Online:</strong></p>
<ul>
<li>Regularly monitor your credit report for suspicious activity.</li>
<li>Information sent over public wi-fi can be stolen. Use secure connections.</li>
<li>Use unique sign-on credentials on all your online accounts and enable two-factor authentication.</li>
<li>Mind your privacy on social media. Do not share details identity thieves can profit from.</li>
</ul>
<p><strong>More tips to protect your identity and information online in the event of a data breach:</strong></p>
<p><a href="https://community.norton.com/en/blogs/norton-protection-blog/what-are-some-laws-regarding-internet-and-data-security">What are the Laws Regarding Internet and Data Security?</a></p>
<p><a href="https://community.norton.com/en/blogs/norton-protection-blog/credit-monitoring-services-and-other-anti-fraud-protection">Credit Monitoring Services and Other Anti-fraud Protection</a></p>
Wed, 08 Jun 2016 12:33:57 +0000https://community.norton.com/de/node/1350631